The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's ...
Abstract: Adversarial attack methods against synthetic aperture radar (SAR) automatic target recognition (ATR) can disrupt adversarial reconnaissance and protect valuable targets. In recent years, ...
Abstract: With the continuous development of deep learning in the field of synthetic aperture radar (SAR) image processing, it is found that image recognition is vulnerable to interference and the ...
Texas A&M professor files suit after firing over gender identity lesson Warnings issued on nationalizing elections, ICE at polls — "Huge danger" Something in Nancy Guthrie's alleged ransom note is ...
UK terrorism risk and financing experts have released their Annual Terrorism Threat Report, outlining the current threat environment and the tactics most likely to be used in an attack. The report ...
Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive data from artificial intelligence (AI) chatbots like ...
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since at least June 2025 with the goal of delivering NetSupport RAT. As of October ...
Qiang Tang receives funding from Google via Digital Future Initiative to support the research on this project. Moti Yung works for Google as a distinguished research scientist. Yanan Li is supported ...
This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS). Attack Vector: This metric reflects the context by which vulnerability ...
An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution. Researchers at Palo Alto Networks have uncovered a new attack method ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results