0

Hugging Face Packages Weaponized With a Single File Tweak

Thứ Ba, 12 tháng 5, 2026
A tokenizer library file present in Hugging Face AI models can be manipulated to hijack the model's outputs and exfiltrate data.
0

20 Leaders Who Built the CISO Era: 2 Decades of Change

As part of Dark Reading's 20th anniversary special coverage, we profile the CISOs, founders, researchers, criminals, and policymakers who rewrote the enterprise risk playbook.
0

Tech Can't Stop These Threats — Your People Can

Thứ Hai, 11 tháng 5, 2026
Security controls can do only so much. Here are four attacks where your employees are usually your first, and only, line of cyber defense.
0

'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros

The privilege escalation vulnerability, which is similar to other Linux flaws like Copy Fail and Dirty Pipe, may already be under limited exploitation.
0

Hackers Use AI for Exploit Development, Attack Automation

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.
0

Cyber Espionage Group Targets Aviation Firms to Steal Map Data

The campaign quietly compromises aerospace and drone operators to exfiltrate GIS files, terrain models, and GPS data and gain a clear picture of adversaries' world view.
0

ShinyHunters Claims Second Attack Against Instructure

Thứ Sáu, 8 tháng 5, 2026
The edtech company is struggling to wrest control from its hackers. PII belonging to hundreds of millions of people is on the line.