X

Vous n'êtes pas connecté

Maroc Maroc - TECHXPLORE.COM - RSS news feed - 28/Mar 16:30

Photon framework scales AI vulnerability discovery

Oak Ridge National Laboratory's Center for Artificial Intelligence Security Research (CAISER) is shining a light on AI vulnerabilities. While AI models offer tremendous economic, humanitarian and national security potential, they are also increasingly susceptible to exploitation. Identifying and characterizing these vulnerabilities has required considerable intellectual effort and specialized expertise.

Articles similaires

Sorry! Image not available at this time

CISA: New Langflow flaw actively exploited to hijack AI workflows

bleepingcomputer.com - 26/Mar 19:17

The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified...

Sorry! Image not available at this time

CISA adds Langflow and Trivy bugs to KEV Catalog

thecyberthrone.in - 27/Mar 12:07

Langflow Code Injection Flaw Actively Exploited — CVE-2026-33017 CISA has added a critical code injection vulnerability in Langflow to its Known...

Sorry! Image not available at this time

Patch now: TP-Link Archer NX routers vulnerable to firmware takeover

securityaffairs.co - 25/Mar 14:44

TP-Link patched a high severity flaw (CVE-2025-15517) in Archer NX routers that could let attackers bypass authentication and install malicious...

Sorry! Image not available at this time

CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks

itsecuritynews.info - 28/Mar 16:07

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known...

Sorry! Image not available at this time

Murgitroyd Launch of Responsible AI Framework

globallegalchronicle.com - 27/Mar 00:00

Murgitroyd’s Responsible AI Framework is grounded in the high regulatory standards set by the Chartered Institute of Patent Attorneys, the...

Sorry! Image not available at this time

Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution

itsecuritynews.info - 24/Mar 11:12

TP-Link recently published a critical security advisory addressing four high-severity vulnerabilities in its Archer series routers. The flaws impact...

Sorry! Image not available at this time

U.S. CISA adds Microsoft SharePoint and Zimbra  flaws to its Known Exploited Vulnerabilities catalog

securityaffairs.co - 18/Mar 21:11

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SharePoint and Zimbra flaws to its Known Exploited Vulnerabilities catalog. The U.S....

Sorry! Image not available at this time

U.S. CISA adds Microsoft SharePoint and Zimbra  flaws to its Known Exploited Vulnerabilities catalog

securityaffairs.co - 18/Mar 21:11

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SharePoint and Zimbra flaws to its Known Exploited Vulnerabilities catalog. The U.S....

Sorry! Image not available at this time

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 16, 2026 to March 22, 2026)

itsecuritynews.info - 27/Mar 21:32

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to...

Adobe Firefly Custom Models Now Available – Train AI Models Using Your Own Artwork

thecekodok.com - 20/Mar 10:08

The objection to generative AI models is that they are trained using creator data without compensation even if intellectual property has been ripped...