Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge?

Few people understand AI, nor how to use nor control it, nor where it is going. Yet politicians wish to regulate it.

The post Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge? appeared first on SecurityWeek.

SecurityWeek – ​Read More

New Flaw in OpenSSH can Lead to Remote Code Execution

A vulnerability in certain versions of the OpenSSH secure networking suite may allow for remote code execution. The vulnerability, identified as CVE-2024-6409 with a CVSS score of 7.0, affects specific versions of OpenSSH such as 8.7p1 and 8.8p1.

Cyware News – Latest Cyber News – ​Read More

How CISA Plans to Measure Trust in Open-Source Software

The CISA is developing a new framework to assess the trustworthiness of open-source software projects. The agency’s open-source software security roadmap aims to increase visibility into OSS use and risks across the federal government.

Cyware News – Latest Cyber News – ​Read More

Google Adds Passkeys to Advanced Protection Program for High-Risk Users

Google on Wednesday announced that it’s making available passkeys for high-risk users to enroll in its Advanced Protection Program (APP).
“Users traditionally needed a physical security key for APP — now they can choose a passkey to secure their account,” Shuvo Chatterjee, product lead of APP, said.
Passkeys are considered a more secure and phishing-resistant alternative to passwords. Based on

The Hacker News – ​Read More

Blast RADIUS Attack can Bypass Authentication for Clients

This vulnerability, known as Blast RADIUS and rated 7.5 out of 10 on the severity scale, affects the RADIUS networking protocol, potentially granting unauthorized access to network devices and services without credentials.

Cyware News – Latest Cyber News – ​Read More

Monocle: Open-Source LLM for Binary Analysis Search

Monocle is an open-source tool powered by an LLM for searching natural language in compiled binaries. It can analyze binaries based on criteria like authentication code or password strings, using Ghidra headless for decompilation.

Cyware News – Latest Cyber News – ​Read More

UK Government Advises Best Practices for Embedded Device Security

The cybersecurity arm of the UK government, RITICS, has released a new guide to assist companies in enhancing the security of their operational technology (OT) and industrial control system (ICS) hardware.

Cyware News – Latest Cyber News – ​Read More

Persistent npm Campaign Shipping Trojanized jQuery

Approximately 68 malicious packages were created between May 26 and June 23, 2024, with deceptive names like cdnjquery and jquertyi. These packages were manually crafted, unlike automated attacks, allowing the threat actor to steal website form data.

Cyware News – Latest Cyber News – ​Read More

Unsecured Database Exposed 39 Million Sensitive Legal Records Online

Millions of Legal Documents Exposed Online! Sensitive data leak raises security concerns for the legal industry. Learn how…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Hackers Target WordPress Calendar Plugin Used by 150,000 Sites

Hackers are targeting a vulnerability in the Modern Events Calendar WordPress plugin found on over 150,000 websites to upload files and execute code remotely. The plugin by Webnus is used to manage events.

Cyware News – Latest Cyber News – ​Read More