Empowering Crisis-Affected Communities: Cisco's Commitment to IRC Signpost

Empowering Crisis-Affected Communities: Cisco's Commitment to IRC Signpost

In times of crisis, armed conflict, or natural disasters, people are forced to adapt and make big, life-changing decisions under extreme pressure. Access to timely, accurate, and straightforward safety information is an invaluable resource for these communities as they relocate, search for critical services and struggle with complex problems. The International Rescue Committee (IRC) teamed up with Mercy Corps to provide durable solutions for people whose lives and livelihoods are shattered by conflict and disaster….

Read More

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Intel Spins Off Enterprise Generative AI Deployment Firm Articul8

Intel and the global investment firm DigitalBridge Group have formed an independent generative AI software stack company, Articul8 AI, Inc. (Articul8); Intel announced the new company on Jan. 3. Articul8 will work with Intel and provide solutions for organizations that wish to build and deploy generative AI. Articul8’s product and capabilities Articul8’s product is “a turnkey GenAI software platform that delivers speed, security and cost-efficiency to help large enterprise customers operationalize and scale AI,” according…

Read More

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse of the ChatGPT name by cybercriminals, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware. Jump to: ChatGPT name is being abused by cybercriminals In the second half of 2023, ESET has blocked 650,000 attempts to access malicious domains whose…

Read More

20 Most Popular TechRepublic Articles in 2023

20 Most Popular TechRepublic Articles in 2023

Here’s a list of the 20 most popular articles published by TechRepublic in 2023. Read articles about ChatGPT, Google Bard, Windows 11 and more. This year, developments in generative AI dominated the tech world, and TechRepublic readers expressed a corresponding interest, specifically in content about AI art generators, ChatGPT and Google Bard. Our readers were interested in tutorials about Windows 11, Microsoft Excel, Google Sheets and iPhone, as well as articles about tech certifications and…

Read More

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Generative AI can be used by attackers, but security professionals shouldn’t lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why. Google Cloud’s team recently spoke about the most notable cybersecurity threats of 2023 — multi-faceted extortion and zero-day exploitation — and predicted more zero-day attacks in 2024, during two public, virtual sessions. Plus, Google predicts that both attackers and defenders will continue to use generative AI. However, generative AI…

Read More

Google Adds Gemini Pro API to AI Studio and Vertex AI

Google Adds Gemini Pro API to AI Studio and Vertex AI

Starting Dec. 13, developers can use Google AI Studio and Vertex AI to build applications with the Gemini Pro API, which allows access to Google’s new generative AI model. Google’s initial rollout of Gemini was limited to Google Bard and the Pixel 8 Pro, so Wednesday’s general availability of Gemini for Google AI Studio and Vertex AI marks the first test of Gemini for enterprise developers. AI Studio and Vertex AI with Gemini can help…

Read More

How to Use Google's Titan Security Keys With Passkey Support

How to Use Google's Titan Security Keys With Passkey Support

Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys edition was used solely for multifactor authentication. Security keys offer a tangible token in the form of a device you may attach to a keyring and place in a pocket. For many people, a security key can be easier…

Read More

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple recommends users update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. Google’s Threat Analysis Group discovered these security bugs. Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS and macOS; users are advised to update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. The vulnerabilities were discovered by Google’s Threat Analysis group, which has been working on fixes for active Chrome vulnerabilities this week as well. Jump to: What are these Apple OS vulnerabilities?…

Read More

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.” Cybersecurity researchers from the firm Hunters discovered a vulnerability in Google Workspace that could allow unwanted access to Workspace APIs. The flaw is significant in that it could let attackers use privilege escalation to gain access that would otherwise only be available to users with Super Admin access. Hunters named this…

Read More

Intel Patches Widespread Processor Vulnerability

Intel Patches Widespread Processor Vulnerability

The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks. Intel has published a fix for a potential vulnerability that affected some Intel processors. The security flaw, named Reptar, causes “very strange behavior,” said Google’s Tavis Ormandy, who is one of the researchers who discovered the bug. No attacks have been reported using the Reptar bug. However, Ormandy noted the bug is potentially wide-reaching and not yet fully…

Read More
1 2 3 4