3 Questions: Modeling adversarial intelligence to exploit AI’s security vulnerabilities

3 Questions: Modeling adversarial intelligence to exploit AI’s security vulnerabilities

If you’ve watched cartoons like Tom and Jerry, you’ll recognize a common theme: An elusive target avoids his formidable adversary. This game of “cat-and-mouse” — whether literal or otherwise — involves pursuing something that ever-so-narrowly escapes you at each try. In a similar way, evading persistent hackers is a continuous challenge for cybersecurity teams. Keeping…

Read More
PARSIQ’s Reactive Network Provides Solution for DeFi Exchange Vulnerabilities

PARSIQ’s Reactive Network Provides Solution for DeFi Exchange Vulnerabilities

Over the past few years, decentralised finance (DeFi) has revolutionised the financial sector. DeFi introduced transparent, permissionless and efficient payment systems, streamlining international transactions. However, this growth has been accompanied by a rise in security challenges and there have been several notable incidents over the years. DeFi exchanges have become prime targets for hackers, leading…

Read More
This AI Paper from Tel Aviv University Introduces GASLITE: A Gradient-Based Method to Expose Vulnerabilities in Dense Embedding-Based Text Retrieval Systems

This AI Paper from Tel Aviv University Introduces GASLITE: A Gradient-Based Method to Expose Vulnerabilities in Dense Embedding-Based Text Retrieval Systems

Dense embedding-based text retrieval has become the cornerstone for ranking text passages in response to queries. The systems use deep learning models for embedding text into vector spaces that enable semantic similarity measurements. This method has been adopted widely in applications such as search engines and retrieval-augmented generation (RAG), where retrieving accurate and contextually relevant…

Read More
Cyble Weekly Vulnerability Insights Shares New Vulnerabilities

Cyble Weekly Vulnerability Insights Shares New Vulnerabilities

Overview  Cyble Research & Intelligence Labs (CRIL) has released its latest Weekly Vulnerability Insights report, offering a detailed overview of the critical vulnerabilities discovered between December 25, 2024, and December 31, 2024. The report highlights key security threats and vulnerabilities, including the addition of a major exploit to the Cybersecurity and Infrastructure Security Agency (CISA)…

Read More
The Worst Hacks of 2024

The Worst Hacks of 2024

Every year has its own mix of digital security debacles, from the absurd to the sinister, but 2024 was particularly marked by hacking sprees in which cybercriminals and state-backed espionage groups repeatedly exploited the same weakness or type of target to fuel their frenzy. For attackers, the approach is ruthlessly efficient, but for compromised institutions—and…

Read More