Blog: Technology and Cybersecurity News
-
NIST Releases Concept Paper for AI Security Control
The NIST (National Institute of Standards and Technology) has just taken an important step to help organizations manage these risks with the release of a concept paper and action plan for “Control Overlays for Securing…
-
Google Releases Gemma 3 270M, a Small But Powerful Energy-Efficient On-Device AI
Google has announced the release of Gemma 3 270M, a new AI model designed to deliver effective performance within a small footprint. This addition to the Gemma family emphasizes energy efficiency and task-specific adaptability, making…
-
Apple Announces Redesigned Blood Oxygen Feature for Some Apple Watch Models
Apple is scheduled to release a software update later today that introduces a redesigned Blood Oxygen feature for select Apple Watch models. Specifically, users of the Apple Watch Series 9, Series 10, and Apple Watch…
-
ESA’s CREAM System Automating Space Collision Avoidance
The increasing number of satellites and debris in Earth’s orbit has made space traffic more complex and challenging to manage. With hundreds of satellites and millions of tiny fragments moving at rapid speeds, avoiding collisions…
-
Oracle Launches AI-Integrated Cloud-Based EHR Platform
Oracle Health has released a new cloud-based EHR (electronic health record) platform called Oracle Health EHR. Built from the ground up with integrated artificial intelligence and voice-first functionality, it is intended to streamline documentation, improve…
-
Update Released for Vulnerability in Zoom Windows Client
Zoom has recently announced a security vulnerability affecting some of its Windows applications. The issue involves an untrusted search path in certain Zoom Windows versions. This could potentially allow a hacker to bypass authentication and…
-
Research Reveals FIDO Authentication Could Be Reverted to Less Secure Methods
Cybersecurity experts have identified a potential new risk that could undermine the security benefits of FIDO passkeys, which are increasingly adopted as a robust defense against credential phishing and account takeover attacks. While FIDO standards…
Categories:
Have any comments or suggestions? Feel free to let us know!