About the Webinar Post-distribution monitoring is often treated as a standalone survey that is completely disconnected from the original distribution data. This siloed approach makes it difficult to verify beneficiary …
Data
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
Dec 06, 2025Ravie LakshmananAI Security / Vulnerability Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate …
Rapid Gender Analysis – Secondary Data Review is a course in which you learn to conduct a Rapid Gender Analysis (RGA) working on your own context using existing data. It …
Government considered destroying its data hub after decade-long intrusion
Gavin Knapp, cyber threat intelligence lead at Bridewell, a supplier to the UK government critical network infrastructure, endorsed the severity of this approach. He said, “it’s like when a device is …
One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within …