Tag Microsoft

WatchGuard Appoints Former SentinelOne COO Srivatsan as Interim CEO

Endpoint Security, Governance & Risk Management, Managed Security Service Provider (MSSP) Vats Srivatsan Appointed Interim CEO at WatchGuard Following Prakash Panjwani’s Departure Michael Novinson (@MichaelNovinson) • May 8, 2025 Vats Srivatsan, interim CEO of WatchGuard (Image: WatchGuard) Vats Srivatsan, the former Chief Operating Officer of SentinelOne, has been appointed as…

Read MoreWatchGuard Appoints Former SentinelOne COO Srivatsan as Interim CEO

Jailbreakers Exploit Invisible Characters to Bypass AI Safeguards

New Research Exposes Weaknesses in Tokenizers Used by Major LLMs Rashmi Ramesh (rashmiramesh_) • May 7, 2025 Researchers have revealed that adversaries can bypass tokenizers using various subtle methods, including emojis and zero-width spaces. (Image: Shutterstock) Recent findings indicate that sophisticated obfuscation tactics can effectively circumvent the safety mechanisms employed…

Read MoreJailbreakers Exploit Invisible Characters to Bypass AI Safeguards

UK Retail Giants Targeted in Hacking Spree

In recent years, Scattered Spider has gained notoriety as a significant threat within the cybersecurity landscape. Rather than being a singular organization, the group operates more as a loose affiliation of hackers who primarily utilize social engineering techniques—such as phishing and deceptive phone calls—to infiltrate corporate networks. Many of the…

Read MoreUK Retail Giants Targeted in Hacking Spree

Microsoft’s “Passwordless by Default” Initiative: Benefits and Drawbacks

Microsoft Embraces Passwordless Logins as Default Option In a significant move toward enhancing cybersecurity, Microsoft has announced that it will make passwordless logins the standard method for creating new accounts. This initiative marks a pivotal shift away from traditional passwords, which have historically posed several security challenges for both businesses…

Read MoreMicrosoft’s “Passwordless by Default” Initiative: Benefits and Drawbacks

TikTok Slapped with €530 Million Fine for Transmitting User Data to China

In our increasingly interconnected world, the management of user data has come under intense examination, particularly concerning applications that share sensitive information across borders. A notable instance of this ongoing debate involves TikTok, the widely-used Chinese mobile video-sharing platform that has faced scrutiny over privacy and data security issues since…

Read MoreTikTok Slapped with €530 Million Fine for Transmitting User Data to China

The Quantum Threat Is Nearer Than You Realize: Urgent Action Needed for Critical Infrastructure

The realm of cybersecurity has traditionally rested on the foundations of cryptography, which safeguards sensitive information across various platforms—from banking applications to encrypted communications in healthcare and military settings. Current cryptographic measures are deemed effective due to the immense time required for modern computers to decrypt complex algorithms, potentially taking…

Read MoreThe Quantum Threat Is Nearer Than You Realize: Urgent Action Needed for Critical Infrastructure

Windows RDP Allows Login with Revoked Passwords, and Microsoft Approves.

Remote Desktop Protocol Vulnerability Exposes Persistent Access Risks Recent findings highlight a significant vulnerability within Windows Remote Desktop Protocol (RDP) that allows users to log in even with revoked passwords. This issue becomes particularly concerning when a Windows machine uses a Microsoft or Azure account to facilitate remote desktop access.…

Read MoreWindows RDP Allows Login with Revoked Passwords, and Microsoft Approves.

AI Code Hallucinations Heighten the Risk of ‘Package Confusion’ Attacks

New Research Uncovers Security Risks Posed by AI-Generated Code Recent studies have revealed alarming vulnerabilities associated with AI-generated computer code, particularly in the context of software supply chains. Researchers found that a significant portion of the code generated by large language models (LLMs) is rife with references to fictitious third-party…

Read MoreAI Code Hallucinations Heighten the Risk of ‘Package Confusion’ Attacks