Monthly Archives: September 2024

Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises

Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and enhancing efficiency. However, despite three generations of technology and 10 years of advancements, SOAR hasn’t fully delivered on its potential, leaving SOCs still grappling with many of the same

ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made it possible for attackers to plant long-term persistent spyware into the artificial intelligence (AI) tool’s memory. The technique, dubbed SpAIware, could be abused to facilitate “continuous data exfiltration of any information the user typed or responses received by ChatGPT, including any future […]

AirDroid Remote Support Review: Tried Firsthand

In this in-depth AirDroid Remote Support review, you’ll find a detailed analysis of its features and functionalities from a real user’s perspective. Screen mirroring and remote device control have been here for a long time to help PC users and technical support providers communicate and resolve issues seamlessly. However, it has never been much easier […]

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content into existing email conversations. […]

CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager (vTM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2024-7593 (CVSS score: 9.8), which could be exploited by a remote unauthenticated attacker to bypass the

It was great to meet with innovators at Tecnológico de Monterrey today, who are building on the university’s legacy by pioneering the use of AI for both students and teachers in the classroom—and beyond.

The post It was great to meet with innovators at Tecnológico de Monterrey today, who are building on the university’s legacy by pioneering the use of AI for both students and teachers in the classroom—and beyond. appeared first on Stories.

It’s great to be back in Mexico City, where the new investments we’re making in AI infrastructure and skilling will help ensure people and organizations across Mexico realize the benefits of this technology shift.

The post It’s great to be back in Mexico City, where the new investments we’re making in AI infrastructure and skilling will help ensure people and organizations across Mexico realize the benefits of this technology shift. appeared first on Stories.