Trusted execution environments, or TEEs, are everywhere-in blockchain architectures, virtually every cloud service, and computing involving AI, finance, and defense contractors. It's hard to overstate the reliance that entire industries have on three TEEs in particular: Confidential Compute from Nvidia, SEV-SNP from AMD, and SGX and TDX from Intel. All three come with assurances that they can't be viewed or altered, even if a server has suffered a complete compromise of the operating kernel. READ MORE...
Get ready to explore the roots of computing and hacking history at Queen City Con, November 7-9! Tim O'Connor is bringing a one-of-a-kind Vintage Hacking display, featuring some of the rarest and most influential computers ever made. Whether you're a tech historian, a hacker at heart, or just curious about early computing, these demos and displays are not to be missed. READ MORE...
Japanese advertising giant Dentsu has disclosed that its U.S.-based subsidiary Merkle suffered a cybersecurity incident that exposed staff and client data. The company states that the incident forced them to take certain systems offline as part of their response plan. "We detected abnormal activity within part of the network of Merkle, a company leading the CXM (Customer Experience Management) area of our group's overseas business," reads Dentsu's announcement. READ MORE...
Cybercriminals are increasingly adopting AI to fuel their attacks against African organizations, using the technology to boost the effectiveness of phishing campaigns and execute impersonation attacks using deepfakes, experts say. Overall, deepfake-related fraud has nearly tripled in the past year, with voice scams driving the growth in generative AI attacks, according to threat intelligence firm Group-IB. READ MORE...
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts say a glut of proxies from Aisuru and other sources is fueling large-scale data harvesting efforts tied to various AI projects. READ MORE...
Threat actors are haunting YouTube, lurking in compromised accounts and using videos to trick unsuspecting users in downloading malware. Check Point Research discovered a collection of malicious YouTube accounts, known as YouTube Ghost Network, promoting malicious links and distributing a wide variety of malware. Though Ghost Network operates across multiple platforms, Checkpoint researchers identified at least 3,000 malicious videos on YouTube associated with the network. READ MORE...
When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull sensitive data out of an organization. The attack does not require direct manipulation of the model. Instead, it takes advantage of what the model is allowed to see during an ordinary task. READ MORE...
The Cybersecurity & Infrastructure Security Agency (CISA) warned today that attackers are actively exploiting two vulnerabilities in Dassault Systèmes' DELMIA Apriso, a manufacturing operations management (MOM) and execution (MES) solution. French company Dassault Systèmes patched the two flaws in early August 2025, when it also confirmed they affect DELMIA Apriso from Release 2020 through Release 2025. READ MORE...