GitHub

Defending against cyber grinches: AI for enhanced security

As the festive season approaches, it brings not only joy and celebrations but also a surge in cyber threats. Alarmingly, 84% of businesses have suffered a phishing attack, making cyber crime the world’s third-largest economy after the US and China. This isn’t set to slow down any time soon, with the estimated cost of global…

Defending against cyber grinches: AI for enhanced security Read More »

Dangerous CLFS and LDAP flaws stand out on Patch Tuesday

Microsoft has issued fixes for 71 Common Vulnerabilities and Exposures (CVEs) to mark the final Patch Tuesday of 2025, with a solitary zero-day that enables privilege elevation through the Windows Common Log File System Driver stealing the limelight. Assigned designation CVE-2024-49138 and credited to CrowdStrike’s Advanced Research Team, the flaw stems from a heap-based buffer…

Dangerous CLFS and LDAP flaws stand out on Patch Tuesday Read More »

Scientists demonstrate Pixelator deepfake image verification tool

A team of data scientists at York St John University have unveiled a cutting-edge tool designed to spot and alert people to deepfake images being used to spread misinformation and other cyber nasties. Created with support from colleagues at the University of Essex and developers at Colchester-based Nosh Technologies, the Pixelator v2 tool uses a…

Scientists demonstrate Pixelator deepfake image verification tool Read More »

Microsoft Ignite: AI capabilities double every six months

During his keynote presentation at the start of Microsoft’s annual Ignite conference in Chicago, CEO Satya Nadella discussed artificial intelligence (AI) scaling, through which the capabilities of the tech is doubling every six months. “Just like Moore’s Law, we saw the doubling in performance every 18 months with AI. We have now started to see…

Microsoft Ignite: AI capabilities double every six months Read More »

Red Hat acquires tech to lower the cost of machine learning

Red Hat has announced its intention to acquire Neural Magic, the lead developer behind the open source vLLM project. The acquisition is being positioned as a way for Red Hat and its parent IBM to lower the barrier to entry for organisations that want to run machine learning workloads without the need to deploy servers…

Red Hat acquires tech to lower the cost of machine learning Read More »

Why geopolitics risks global open source collaborations

Following the removal last week of Russian Linux kernel maintainers to comply with US policies, Linus Torvalds – the developer of the original Linux kernel – spoke about his concerns that there were lots of Russian trolls who could potentially infiltrate the Linux kernel. The decision to block the maintainers followed a compromise of the…

Why geopolitics risks global open source collaborations Read More »

AI becomes Microsoft’s fastest-growing business

Microsoft’s artificial intelligence (AI) business is set to hit an annual run rate for subscription renewals of $10bn. For the quarter that ended September 30, the company reported revenue of $65.6bn, up 16%. The Microsoft Cloud business posted revenue of $38.9bn, an increase of 22%, while its productivity and business processes business reported a 12%…

AI becomes Microsoft’s fastest-growing business Read More »

Printing vulnerability affecting Linux distros raises alarm

A newly discovered series of four dangerous flaws in the Common Unix Printing System (Cups), which is used across virtually all GNU/Linux distros including Debian, Red Hat and SUSE, as well as Apple macOS and Google Chrome/Chromium among other things, is causing alarm bells to ring for security professionals over the potential scope of the…

Printing vulnerability affecting Linux distros raises alarm Read More »

PyPI loophole puts thousands of packages at risk of compromise

Thousands of applications that have taken advantage of open source Python Package Index (PyPI) software packages may be at risk of hijacking and subversion by malicious actors, opening up the possibility of major supply chain attacks affecting even greater numbers of downstream organisations and users. That is according to threat researchers at jFrog, who identified…

PyPI loophole puts thousands of packages at risk of compromise Read More »

NCSC and allies call out Russia’s Unit 29155 over cyber warfare

The UK’s National Cyber Security Centre (NCSC) and its counterpart bodies in the Five Eyes intelligence alliance have joined partners from Czechia, Estonia, Germany, Latvia and Ukraine to identify a Russian military cyber unit that has been conducting a sustained campaign of malicious activity over the past four years. Part of the Main Directorate of…

NCSC and allies call out Russia’s Unit 29155 over cyber warfare Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top