Tag machine learning

A Limited Set of Training Documents Can Enable a Backdoor in LLMs

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Study Reveals Minor Data Poisoning Can Compromise Large Language Models Rashmi Ramesh (rashmiramesh_) • October 14, 2025 Image: ArtemisDiana/Shutterstock Recent findings indicate that as few as a few hundred malicious training documents can lead a large language model (LLM) to…

Read MoreA Limited Set of Training Documents Can Enable a Backdoor in LLMs

GitHub Copilot Chat Vulnerability Exposes Private Code Through Images

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Research Uncovers Vulnerability Allowing Data Exfiltration via Hidden Images Rashmi Ramesh (rashmiramesh_) • October 9, 2025 Image: PJ McDonnell/Shutterstock A recently resolved vulnerability within GitHub Copilot Chat has been identified, which could have permitted threat actors to extract source code…

Read MoreGitHub Copilot Chat Vulnerability Exposes Private Code Through Images

EU Reveals Plans for AI Technology Sovereignty

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development AI Strategies Aim to Strengthen Global AI Position Akshaya Asokan (asokan_akshaya) • October 8, 2025 Henna Virkkunen, European Commissioner for Technological Sovereignty, Security, and Democracy, during an Aug. 10, 2025 European Parliament session. (Image: Philippe Stirnweiss/European Union) The European Union…

Read MoreEU Reveals Plans for AI Technology Sovereignty

Why Businesses Persist with Traditional AI Solutions

Artificial Intelligence & Machine Learning, Data Privacy, Data Security Explainability, Cost, Compliance Drive AI Choices in Enterprises Sandhya Michu • October 8, 2025 Image: Shutterstock In the evolving landscape of artificial intelligence, while technologies have become democratized and more accessible, experts caution against the uncritical adoption of large language models…

Read MoreWhy Businesses Persist with Traditional AI Solutions

Former Google Engineer Arrested for Allegedly Stealing AI Technology Trade Secrets for China

The U.S. Department of Justice (DoJ) has indicted a 38-year-old Chinese national and a California resident for allegedly stealing proprietary information from Google while covertly working for two tech firms based in China. The indictment highlights a significant cybersecurity breach involving sensitive data theft pertinent to artificial intelligence. Linwei Ding,…

Read MoreFormer Google Engineer Arrested for Allegedly Stealing AI Technology Trade Secrets for China

The Surge of Zero-Day Vulnerabilities: Limitations of Traditional Security Solutions

In recent years, organizations worldwide have seen a dramatic increase in both the number and complexity of zero-day vulnerabilities, significantly jeopardizing their cybersecurity. A zero-day vulnerability refers to a software flaw that is unknown to the vendor, rendering it unpatched upon discovery, which attackers exploit to breach systems undetected. The…

Read MoreThe Surge of Zero-Day Vulnerabilities: Limitations of Traditional Security Solutions

Enhancing OT Security Through AI and Machine Learning

Strengthening Operational Technology Security with AI and Machine Learning As cyber threats targeting operational technology (OT) continue to escalate, organizations are grappling with the imperative of bolstering their cybersecurity measures. A recent article highlights that enhancing protection requires not only smarter threat intelligence but also accelerated capabilities for detection and…

Read MoreEnhancing OT Security Through AI and Machine Learning

Security Vulnerabilities in Leading ML Toolkits Allow for Server Takeovers and Privilege Escalation

Recent cybersecurity research has revealed a significant number of security vulnerabilities affecting nearly two dozen open-source machine learning (ML) projects. The findings, reported by software supply chain security firm JFrog, highlight weaknesses present on both the server and client sides of these technologies. The identified server-side vulnerabilities pose a serious…

Read MoreSecurity Vulnerabilities in Leading ML Toolkits Allow for Server Takeovers and Privilege Escalation