Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: AI

  1. Home
  2. AI

GitHub Copilot Chat Flaw Leaked Data From Private Repositories

github-copilot-chat-flaw-leaked-data-from-private-repositories

Hidden comments allowed full control over Copilot responses and leaked sensitive information and source code.

The post GitHub Copilot Chat Flaw Leaked Data From Private Repositories appeared first on SecurityWeek.

AI Takes Center Stage at DataTribe’s Cyber Innovation Day

ai-takes-center-stage-at-datatribe’s-cyber-innovation-day

From defending AI agents to teaching robots to move safely, finalists at this year’s DataTribe Challenge are charting the next frontier in cybersecurity innovation.

The post AI Takes Center Stage at DataTribe’s Cyber Innovation Day appeared first on SecurityWeek.

Will AI-SPM Become the Standard Security Layer for Safe AI Adoption?

will-ai-spm-become-the-standard-security-layer-for-safe-ai-adoption?

How security posture management for AI can protect against model poisoning, excessive agency, jailbreaking and other LLM risks.

The post Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? appeared first on SecurityWeek.

Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities 

google-deepmind’s-new-ai-agent-finds-and-fixes-vulnerabilities 

The new product is called CodeMender and it can rewrite vulnerable code to prevent future exploits. 

The post Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  appeared first on SecurityWeek.

Google Offers Up to $20,000 in New AI Bug Bounty Program

google-offers-up-to-$20,000-in-new-ai-bug-bounty-program

The company has updated the program’s scope and has combined the rewards for abuse and security issues into a single table.

The post Google Offers Up to $20,000 in New AI Bug Bounty Program appeared first on SecurityWeek.

Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results

google-patches-gemini-ai-hacks-involving-poisoned-logs,-search-results

Researchers found more methods for tricking an AI assistant into aiding sensitive data theft.

The post Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results appeared first on SecurityWeek.

Salesforce AI Hack Enabled CRM Data Theft

salesforce-ai-hack-enabled-crm-data-theft

Prompt injection has been leveraged alongside an expired domain to steal Salesforce data in an attack named ForcedLeak.

The post Salesforce AI Hack Enabled CRM Data Theft appeared first on SecurityWeek.

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

top-25-mcp-vulnerabilities-reveal-how-ai-agents-can-be-exploited

A new ranking of Model Context Protocol weaknesses highlights critical risks—from prompt injection to command injection—and provides a roadmap for securing the foundations of agentic AI.

The post Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited appeared first on SecurityWeek.

Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform

mycroft-raises-$3.5-million-for-ai-powered-security-and-compliance-platform

The Canada-based company has emerged from stealth with autonomous AI agents designed to manage and operate the security and IT stack.

The post Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform appeared first on SecurityWeek.

ChatGPT Tricked Into Solving CAPTCHAs

chatgpt-tricked-into-solving-captchas

The AI agent was able to solve different types of CAPTCHAs and adjusted its cursor movements to better mimic human behavior.

The post ChatGPT Tricked Into Solving CAPTCHAs appeared first on SecurityWeek.

  • Previous
  • 1
  • ...
  • 3
  • 4
  • 5
  • ...
  • 27
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it