The Latest in IT Security

Posts Tagged ‘vulnerabilities’

Deepfake is the name given technology that creates convincing copies of images, videos and voices using AI. Deepfake technologies have been developing rapidly for about five years already. The idea of ​​creating fakes by combining real and generated data is not new. But it’s the use of neural networks and deep learning that has allowed […]

Read more ...

Federal authorities are warning the healthcare sector of a rise in cyberattacks against a backup application made by software developer Veeam. The attacks appear tied to exploitation of a high-severity vulnerability in the vendor’s software disclosed in March. The vulnerability, tracked as CVE-2023-27532, exposes encrypted credentials stored in Veeam Backup & Replication. Its exploitation could […]

Read more ...

Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks. First up in May’s zero-day flaws is CVE-2023-29336, which is an “elevation of privilege” weakness in Windows which has a […]

Read more ...


Categories

TUESDAY, MARCH 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments