A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data …
Safety & Security
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Oct 09, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access …
What safety topics should you cover this fall?
Prominent occupational health and safety (OHS) lawyers Dale McQualter and Catherine Dunlop have just concluded the first of two online seminars about Victoria’s new psychological/psychosocial regulations and …
“We’re hiring selectively for AI and machine learning expertise, but we’re also investing in our existing talent — training them to understand how AI works, how to validate models, and …
One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within …
How EHS Insight Enhances Safety and Compliance in Chemical Manufacturing
Chemical manufacturing is one of the most complex and high-risk industries in the world. With strict regulations, hazardous substances, and ever-changing compliance requirements, safety isn’t optional—it’s mission-critical.
Occupational health and safety (OHS) can feel like nothing but administrative work, wading through safety clutter. It is easy to forget that OHS is about preventing harm …
Red Hat OpenShift AI weakness allows full cluster compromise, warns advisory
According to Red Hat’s advisory, an attacker exploiting it would be able to: “Steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total …
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by …