Tag Microsoft

Microsoft Disrupts Storm-2139: Combating LLMjacking and Azure AI Exploitation

Microsoft has launched a legal initiative against Storm-2139, a cybercriminal organization exploiting vulnerabilities in its Azure AI infrastructure. This group has been linked to a scheme known as LLMjacking, which involves the unauthorized hijacking of Large Language Models (LLMs) facilitated by the theft of Application Programming Interface (API) keys. These…

Read MoreMicrosoft Disrupts Storm-2139: Combating LLMjacking and Azure AI Exploitation

Claroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Gartner’s First-Ever Ranking of Cyber-Physical Security Vendors Highlights a Shift in Market Dynamics In a comprehensive new report by Gartner, the cyber-physical security landscape has been significantly illuminated, spotlighting the leading vendors within this niche sector. Not only have traditional players like Microsoft entered the fray, but dedicated operational technology…

Read MoreClaroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Scaling AI with Test-Time Computing

New Approach Focuses on Enhancing AI Model Efficiency Rather than Size Rashmi Ramesh (rashmiramesh_) • February 27, 2025 Image: Shutterstock Historically, the prevailing belief was that increasing the computational resources devoted to artificial intelligence models would lead to substantial performance gains. This assumption rested on the idea that improvements would…

Read MoreScaling AI with Test-Time Computing

Copilot Leaks Private GitHub Pages; Microsoft Takes Action to Remove Them

Microsoft’s Copilot tool continues to access sensitive data despite the company’s efforts to restrict its use of removed resources from GitHub. A recent investigation by Lasso has uncovered that Microsoft’s attempts to limit access to a specialized Bing interface—which had previously been available at cc.bingj.com—have proven inadequate. Notably, while public…

Read MoreCopilot Leaks Private GitHub Pages; Microsoft Takes Action to Remove Them

Female Founders Launch Cloud Security Technology Set to Transform AI Protection

In the mid-2010s, Alex Zenla, while delving into internet-of-things (IoT) security, identified a significant issue. The limited processing power of IoT devices hindered their ability to implement cloud-based security measures effectively, unlike traditional PCs and servers equipped with advanced processors. This disparity left many embedded devices directly connected to local…

Read MoreFemale Founders Launch Cloud Security Technology Set to Transform AI Protection

Google Introduces Next-Generation Quantum-Safe Digital Signatures

Encryption & Key Management, Security Operations Tech Giant Raises Alarm Over Future Vulnerability of Secure Communications Akshaya Asokan (asokan_akshaya) • February 21, 2025 Image: Shutterstock Google has introduced quantum-safe digital signatures to its cloud services, aiming to equip users to better defend against emerging adversarial threats. This announcement follows closely…

Read MoreGoogle Introduces Next-Generation Quantum-Safe Digital Signatures

MDR and EDR Markets Experience Surge in M&A Activity Amid Intensifying Competition

Endpoint Detection & Response (EDR), Managed Detection & Response (MDR), Next-Generation Technologies & Secure Development Vendors Consolidate Endpoint, Managed Offerings to Combat Major Industry Players Michael Novinson (MichaelNovinson) • February 21, 2025 Image: Shutterstock The competitive dynamics among Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) service…

Read MoreMDR and EDR Markets Experience Surge in M&A Activity Amid Intensifying Competition

Microsoft Hosted Explicit Videos of This Startup Founder for Years: Here’s How She Had Them Removed

On the first of August last year, the nonprofit organization Point de Contact disclosed to WIRED that only a pair of images remained on four separate Microsoft servers, following significant communication with the tech giant that spanned nearly ten months. In an email statement, Point de Contact expressed their regret…

Read MoreMicrosoft Hosted Explicit Videos of This Startup Founder for Years: Here’s How She Had Them Removed

Ukrainian Signal Users Targeted by Russian Social Engineering Tactics

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Google Warns of Escalating Cyber Tactics Targeting Signal Users; Global Implications Exist Akshaya Asokan (asokan_akshaya) • February 19, 2025 Image: Shutterstock Recent investigations reveal that Russian state-sponsored hackers are employing phishing tactics to compromise users of the secure messaging app Signal in…

Read MoreUkrainian Signal Users Targeted by Russian Social Engineering Tactics