The now-patched bugs are under active exploit and enable attackers to carry out a wide range of malicious activities, including escaping a virtual machine and gaining access to the underlying host.
Amnesty International said Serbian police used an exploit chain in tandem with a legitimate mobile extraction dongle from vendor Cellebrite in an attack that brings up questions around ethical technology development.
CISOs should add more to their vision than technology as a global report published by the World Economic Forum identifies a closely interconnected cocktail of risk.
Join us on March 20 for this all-day virtual event, designed to update cybersecurity teams on some of the most promising emerging cybersecurity technologies and provide advice on using them.
The cybersecurity job market nowadays is facing an unusual paradox: Many roles seem open, but competition and hiring practices can make securing a position a real challenge.
Data poisoning represents the next big existential cybersecurity threat — unless organizations can ensure their AI systems are safe and trustworthy.