Researchers Uncover Vulnerabilities in Open-Source AI and ML Models – Go Health Pro

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models – Go Health Pro

Oct 29, 2024Ravie LakshmananAI Security / Vulnerability A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part … Read more

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security – Go Health Pro

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security – Go Health Pro

Oct 25, 2024Ravie LakshmananCloud Security / Artificial Intelligence Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the “most advanced security architecture ever … Read more

Researchers discover flaws in 5 end-to-end encrypted cloud services – Go Health Pro

Researchers discover flaws in 5 end-to-end encrypted cloud services – Go Health Pro

Several major end-to-end encrypted cloud storage services contain cryptographic flaws that could lead to loss of confidentiality, file tampering, file injection and more, researchers from ETH Zurich said in a paper published this month. The five cloud services studied offer end-to-end encryption (E2EE), intended to ensure files can not be read or edited by anyone … Read more

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates – Go Health Pro

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates – Go Health Pro

Oct 15, 2024Ravie LakshmananThreat Detection / Malware Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate code-signing certificates. French cybersecurity company HarfangLab, which detected the activity at the start of the month, said the attack chains aim to deploy an information stealer known as Lumma. Hijack … Read more

‘LLM hijacking’ of cloud infrastructure uncovered by researchers – Go Health Pro

‘LLM hijacking’ of cloud infrastructure uncovered by researchers – Go Health Pro

“LLM hijacking” of cloud infrastructure for generative AI has been leveraged by attackers to run rogue chatbot services at the expense of victims, Permiso researchers reported Thursday. Attacks on AWS Bedrock environments, which support access to foundational large language models (LLMs) such as Anthropic’s Claude, were outlined in a Permiso blog post, with a honeypot … Read more

x