Cybersecurity

FTC soliciting contest submissions to help tackle voice cloning technology

The Federal Trade Commission (FTC) is now accepting submissions for a contest designed to spur development of products and policies to protect consumers from the malicious use of voice cloning technology, which has been fueled by the advance of text-to-speech artificial intelligence capabilities. The challenge is an effort by the FTC to speed the evolution […]

Cybersecurity

Cybercriminals continue targeting open remote access products – Help Net Security

Cybercriminals still prefer targeting open remote access products, or like to leverage legitimate remote access tools to hide their malicious actions, according to WatchGuard. “Threat actors continue using different tools and methods in their attack campaigns, making it critical for organizations to keep abreast of the latest tactics to fortify their security strategy,” said Corey […]

Cybersecurity

Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems

Two vulnerabilities discovered earlier this year in Atos Unify products could allow malicious actors to cause disruption and even backdoor the targeted system. The flaws were found in the unified communications and collaboration solution by researchers at SEC Consult, an Austria-based cybersecurity consulting firm that is part of the Atos Group’s Eviden business. The vulnerabilities […]

Cybersecurity

Vulnerabilities Allow Hackers to Hijack, Disrupt Socomec UPS Devices

Some uninterruptible power supply (UPS) products made by Socomec are affected by several vulnerabilities that can be exploited to hijack and disrupt devices. Socomec is a France-based electrical equipment manufacturing company that specializes in low voltage energy performance. Its offering includes modular UPS devices that are used by businesses in various sectors around the world. […]