DeepSeek App Transmits Sensitive User and Device Data Without Encryption
Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of…
Top 5 AI-Powered Social Engineering Attacks
Social engineering has long been an effective tactic because of how it…
Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Over 57 distinct threat actors with ties to China, Iran, North Korea,…
What’s Effective and What’s Not – Insights from 200 Experts
Jan 29, 2025The Hacker NewsThreat Detection / Artificial Intelligence Curious about the…
Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks
Jan 28, 2025Ravie LakshmananArtificial Intelligence / Technology DeepSeek, the Chinese AI startup…
What You Need to Know About OpenAI’s Operator
Over the past few weeks, OpenAI has been laying groundwork. While most…
Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review
Jan 22, 2025Ravie LakshmananCybersecurity / National Security The new Trump administration has…
Amazon Nova Foundation Models: Redefining Price and Performance in Generative AI
Generative AI transforms industries by enabling unique content creation, automating tasks, and…
Agent Laboratory: A Virtual Research Team by AMD and Johns Hopkins
While everyone's been buzzing about AI agents and automation, AMD and Johns…