News
Python-Bibliotheken für Hugging-Face-Modelle vergiftet
3+ hour, 30+ min ago (280+ words) Tristan Fincken ist Junior Editor f'r die B2B-Marken von Foundry. Thematisch befasst er sich mit einer Bandbreite von Themen, die von Cybersecurity bis aktuellen Tech-Highlights reicht. NeMo, Uni2TS und FlexTok, Python-Bibliotheken f'r K'nstliche Intelligenz (KI) und Machine Learning (ML), die in Hugging-Face-Modellen…...
AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform
5+ day, 1+ hour ago (312+ words) A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and move faster than any cyber stack can…...
CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity
1+ week, 13+ hour ago (154+ words) CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity'csoonline.com CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity In this first CSO Executive Session ASEAN of 2026, I sat down with Mandy…...
Podcast: Die IT-Tops und -Flops 2025
4+ week, 10+ hour ago (394+ words) Ein turbulentes Jahr 2025 neigt sich dem Ende zu. Es war gepr'gt von wirtschaftlicher Unsicherheit, geopolitischen Spannungen und dem ungebremsten Siegeszug der K'nstlichen Intelligenz. Grund genug f'r die Redaktion von Computerwoche, CIO und CSO, in der letzten TechTalk-Podcast-Folge des Jahres Bilanz…...
Human-in-the-loop isn’t enough: New attack turns AI safeguards into exploits
1+ mon, 1+ day ago (538+ words) Human-in-the-loop (HITL) safeguards that AI agents rely on can be subverted, allowing attackers to weaponize them to run malicious code, new research from CheckMarx shows. HITL dialogs are a safety backstop (a final "are you sure?) that the agents run…...
AI, automation, and integration: The foundation for cyber protection in 2026
1+ mon, 2+ week ago (413+ words) Cyber protection grew more complex in 2025 as more threat actors turned to artificial intelligence (AI) to increase their speed, scale, and precision. These autonomous ransomware, phishing, and data exfiltration attacks outpaced legacy tools and exploited gaps between security and backup…...
CSO in eigener Sache: Mit Smart Answers zu mehr Information
1+ mon, 3+ week ago (271+ words) Wie k'nnen CISOs ihre Karriere pushen? Welche Auswirkungen haben Ransomware-Angriffe auf Unternehmen? Wie l'uft die Kommunikation nach einem Cyberangriff ab? Diese und viele weitere Fragen beantworten wir Ihnen auf der Website der CSO "ber unser neues KI-Tool "Smart Answers. Bei…...
From detection to response: Why confidence is the real game changer
2+ mon, 4+ day ago (333+ words) Cybersecurity often feels like a race where you don't know when the starting gun will fire. The moment a threat slips past the perimeter, the countdown begins. Every minute between "we detected something" and "we know what to do about…...
Whisper Leak uses a side channel attack to eavesdrop on encrypted AI conversations
2+ mon, 1+ week ago (548+ words) Researchers at Microsoft have revealed a new side channel attack named Whisper Leak that can reveal the topic of encrypted conversations between users and language models, even without access to the underlying text. The discovery highlights a growing blind spot…...
LLMs easily exploited using run-on sentences, bad grammar, image scaling
4+ mon, 3+ week ago (1006+ words) A series of vulnerabilities recently revealed by several research labs indicate that, despite rigorous training, high benchmark scoring, and claims that artificial general intelligence (AGI) is right around the corner, large language models (LLMs) are still quite na've and easily…...