admin

Elon Musk-owned social media platform X (formerly known as Twitter) expanded its Community Notes’ contributor positions to India on Thursday. With this development, Indian users can apply to become contributors to this open-source moderation tool to rate and review posts that are misleading or are spreading misinformation. Community Notes was officially introduced in November 2022
0 Comments
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers’ models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. “Malicious
0 Comments
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top
0 Comments
Just Corseca unveiled new personal audio products earlier this month and among them were the Just Corseca Soundwave true wireless (TWS) earphones. They come with 13mm drivers and promise a playback time of up to 40 hours. These are also equipped with hybrid noise cancellation, allowing users to choose between two modes and the multi-touch
0 Comments
India could start the process of legislating artificial intelligence (AI) regulations right after the conclusion of the general elections, the Union Minister of Electronics & Information Technology Ashwini Vaishnaw said, as per a report. India has been planning to create some sort of regulatory framework to tackle various issues that have surfaced with the rise
0 Comments
Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. “The phishing emails use a unique vehicle incident lure and, in later stages of the infection chain, spoof the Federal Bureau of Transportation in a PDF that mentions
0 Comments