Israel’s 2025 banking supervision report flags cyber risk as the top threat facing the financial sector, with regulators highlighting concerns over advanced attack scenarios, supply chain compromises, and potential adversarial use of AI.
YouTube's new feature to combat deepfakes and unauthorized use of people's faces
YouTube has added a new feature that allows individuals over 18 years old to scan their faces and identify AI-generated videos that misuse their images. Users can request the removal of these videos if they wish.
YouTube has added a new feature that allows individuals over 18 years old to scan their faces and identify AI-generated videos that misuse their images. Users can request the removal of these videos if they wish.
Compromised Nx Console 18.95.0 executed a credential-stealing payload after VS Code users opened workspaces.
The extension has 2.2M+ installs; affected users should update to 18.100.0 and rotate reachable secrets.
The extension has 2.2M+ installs; affected users should update to 18.100.0 and rotate reachable secrets.
Ultimate irony: Microsoft researchers say you shouldn’t trust AI with work docs.
‘The Worst Leak That I’ve Witnessed’: U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub — Gizmodo.
Apple spent 5 years & billions on MIE — hardware memory safety for M5 to kill kernel exploits.
A small team + Mythos Preview AI just dropped the first public one in 5 days: data-only user → root on M5 macOS with MIE enabled.
A small team + Mythos Preview AI just dropped the first public one in 5 days: data-only user → root on M5 macOS with MIE enabled.
😁1
Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare.
🔥1
SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access.
👾1
Bloomberg: Hackers reportedly wiped data from more than 50 small Israeli companies and compromised dozens of security cameras, according to an Israeli cyber official.
🥰1😁1
Palo Alto Networks has confirmed that a zero-day vulnerability in its firewalls is actively being exploited, with cyber attackers using it to infiltrate organizational networks.
🔥1
The Iraqi hacker group "313" announced in a new statement that the attack on the American company "GoDaddy" has caused widespread disruptions.
🥰1👏1😁1
Microsoft released mitigations for YellowKey, a BitLocker bypass tracked as CVE-2026-45585.
The flaw can let attackers with physical access access encrypted data via WinRE.
Mitigations include switching TPM-only BitLocker to TPM+PIN and removing autofstx.exe from WinRE BootExecute.
The flaw can let attackers with physical access access encrypted data via WinRE.
Mitigations include switching TPM-only BitLocker to TPM+PIN and removing autofstx.exe from WinRE BootExecute.
👻1🦄1
Russia turns to Huawei's Chinese chips for AI development
Reports indicate that Russia is seeking to use advanced AI accelerators from Huawei to develop the AI model "GigaChat"; these chips have been developed by China as competitors to NVIDIA products.
Reports indicate that Russia is seeking to use advanced AI accelerators from Huawei to develop the AI model "GigaChat"; these chips have been developed by China as competitors to NVIDIA products.
👏1😁1
CVE-2025-54539: Apache ActiveMQ NMS AMQP Deserialization Policy Bypass to RCE.
GhostTree: Unveiling Path Manipulation Techniques to Bypass Windows Security.