Tag: nvidia
-
China Questions Security of AI Chips From NVIDIA, AMD
The US banned the sale of AI chips to China and then backed off. Now, Chinese sources are calling on NVIDIA to prove its AI chips have no backdoors. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/china-questions-security-ai-chips-nvidia-amd
-
Nvidia and AMD Agree to Revenue Share with the US as Security Scrutiny Intensifies
Nvidia and AMD have reportedly reached an unprecedented agreement with the United States government to pay 15 percent of their revenues from certain chip sales in China in exchange for export licenses. The arrangement covers Nvidia’s H20 chips and AMD’s MI308 chips, both designed for the Chinese market to comply with U.S. export control rules….…
-
âš¡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses in popular software and coming up with clever ways to get around security. Even one unpatched flaw could let attackers in, leading to data theft or even taking control of your systems. The clock is ticking”, if defenses…
-
AMD und Nvidia Regierung wird mit 15 Prozent am China-Umsatz beteiligt
AMD und Nvidia dürfen erste AI-Chips nach China schicken. Ein Novum dabei: 15 Prozent der China-Einnahmen gehen wohl direkt an Washington. First seen on computerbase.de Jump to article: www.computerbase.de/news/wirtschaft/amd-und-nvidia-us-regierung-wird-mit-15-prozent-am-china-umsatz-beteiligt.93832
-
Otorio Buy Fuels Armis’ OT Security and AI-Driven Growth
CEO Yevgeny Dibrov Says Otorio Acquisition Positions Armis for Strong Growth. Armis CEO Yevgeny Dibrov outlines how the Otorio acquisition is driving OT security advances, enabling on-prem deployments and secure remote access. He also details AI’s role in defense, Nvidia collaborations and upcoming products to expand the cyber exposure management suite. First seen on govinfosecurity.com…
-
Vollständige Systemübernahme möglich – Kritische Schwachstellen in NVIDIA Triton bedroht KI-Infrastrukturen
First seen on security-insider.de Jump to article: www.security-insider.de/nvidia-triton-server-kritische-schwachstellen-systemuebernahme-a-e4c34de2bdfcc95d49349670f381a9ff/
-
Nvidia Pushes Back on Chinese ‘Kill-Switch’ Claims
Chipmaker Argues Against Growing Interest in US to Require New Security Measures. Artificial intelligence chip-making powerhouse Nvidia is rejecting claims from China’s top cyber agency that its H20 chips include location tracking and kill-switch features – while warning U.S. lawmakers against requiring those capabilities in future chip designs. First seen on govinfosecurity.com Jump to article:…
-
Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips
Nvidia has issued a comprehensive denial regarding allegations that its graphics processing units contain backdoors, kill switches, or spyware, emphasizing that such features would fundamentally undermine global digital infrastructure and cybersecurity principles. The chipmaker’s statement comes amid growing discussions among policymakers and industry observers about potential hardware-level controls that could remotely disable GPUs without user…
-
NVIDIA Takes Firm Stance Against Kill Switches Backdoors in AI Chips
The statement comes as both US and Chinese authorities probe the lucrative global AI chip business, which NVIDIA dominates. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-nvidia-ai-chips-backdoors-kill-switches/
-
Nvidia patches critical Triton server bugs that threaten AI model security
This could matter to AI everywhere: Wiz researchers focused their analysis on Triton’s Python backend, citing its popularity and central role in the system. While it handles models written in Python, it also serves as a dependency for several other backendsmeaning models configured under different frameworks may still rely on it during parts of the…
-
Chaining NVIDIA’s Triton Server flaws exposes AI systems to remote takeover
New flaws in NVIDIA’s Triton Server let remote attackers take over systems via RCE, posing major risks to AI infrastructure. Newly revealed security flaws in NVIDIA’s Triton Inference Server for Windows and Linux could let remote, unauthenticated attackers fully take over vulnerable servers. According to Wiz Research team, chaining these vulnerabilities enables remote code execution…
-
Nvidia Patches Critical RCE Vulnerability Chain
The flaws in the company’s Triton Inference Server enables model theft, data leaks, and response manipulation. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/nvidia-patches-critical-rce-vulnerability-chain
-
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
Tags: ai, control, exploit, flaw, intelligence, linux, nvidia, open-source, remote-code-execution, windowsA newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers.”When chained together, these flaws can potentially allow a remote, unauthenticated attacker to gain complete control of the server, achieving remote…
-
Nvidia H20 und mehr – Gigantischer Rückstau in US-Behörde verhindert Exporte
Bei der in den USA für Exportlizenzen zuständigen Behörde hat sich ein Rückstau gebildet, der unter anderem Nvidias H20 betrifft. First seen on computerbase.de Jump to article: www.computerbase.de/news/wirtschaft/nvidia-h20-und-mehr-gigantischer-rueckstau-in-us-behoerde-verhindert-exporte.93768
-
Security Affairs newsletter Round 535 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. New Linux backdoor Plague bypasses auth via malicious PAM module China Presses Nvidia Over Alleged Backdoors…
-
China Presses Nvidia Over Alleged Backdoors in H20 Chips Amid Tech Tensions
China questioned Nvidia over suspected backdoors in its H20 chips, adding to rising tensions in the tech fight between the U.S. and Beijing. China’s internet watchdog has summoned Nvidia over concerns that its H20 AI chips may contain hidden backdoors. Nvidia H20 chips are AI GPUs tailored for the Chinese market, based on Hopper architecture.…
-
China Investigates NVIDIA’s H20 Chips for Surveillance Risks
NVIDIA has been called in by Chinese regulators over claims that its H20 AI chip poses security risks, putting billions in potential sales at stake. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-china-investigates-nvidia-h20-chips-backdoor-security-risks/
-
A backlog at the Commerce Department is reportedly stalling Nvidia’s H20 chip licenses
Tags: nvidiaNews of a backlog at the U.S. federal department comes less than a week after national security experts urged the Trump administration to reverse its decision that allows Nvidia to export H20 chips to China. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/01/a-backlog-at-the-commerce-department-is-reportedly-stalling-nvidias-h20-chip-licenses/
-
Beijing summons Nvidia over alleged backdoors in China-bound AI chips
H20 silicon under the microscope after slipping through US export bans First seen on theregister.com Jump to article: www.theregister.com/2025/07/31/beijing_nvidia_backdoors/
-
China Summons Nvidia Over Alleged Backdoor Risks in AI Chips
China’s top cybersecurity authority, the Cyberspace Administration of China (CAC), has officially summoned representatives from Nvidia to address alleged security vulnerabilities in its AI chips sold in the country. The specific focus is on Nvidia H20 chips, a custom version designed for the Chinese market amid strict U.S. export controls. First seen on thecyberexpress.com Jump…
-
USAVerhandlungen – Das Tauziehen um Nvidias H20 geht in die nächste Runde
US-Offizielle sollen China für aktuelle Verhandlungen in Schweden entgegenkommen. Kritiker äußern Bedenken zur jüngsten H20-Entscheidung. First seen on computerbase.de Jump to article: www.computerbase.de/news/wirtschaft/usa-china-verhandlungen-das-tauziehen-um-nvidias-h20-geht-in-die-naechste-runde.93684
-
Chrome’s AI Challenger Has Landed: Meet Comet
Perplexity’s Comet Blends Familiarity With Agentic AI to Reshape the Web. Perplexity, the fast-rising AI search engine startup backed by the likes of Nvidia and Jeff Bezos, is riding on a cosmic high with the launch of Comet – a full-featured AI-native web browser that claims to browse at the speed of thought. First seen…
-
A billion dollars’ worth of Nvidia chips fell off a truck and found their way to China, report says
Psst, wanna buy some innovation? First seen on theregister.com Jump to article: www.theregister.com/2025/07/24/nvidia_chips_china_whoops/
-
Researchers Release PoC Exploit for High-Severity NVIDIA AI Toolkit Bug
Wiz Research has disclosed a severe vulnerability in the NVIDIA Container Toolkit (NCT), dubbed #NVIDIAScape and tracked as CVE-2025-23266 with a CVSS score of 9.0, enabling malicious containers to escape isolation and gain root access on host systems. This flaw, stemming from a misconfiguration in OCI hook handling, affects NCT versions up to 1.17.7 (in…
-
âš¡ Weekly Recap: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More
Even in well-secured environments, attackers are getting in”, not with flashy exploits, but by quietly taking advantage of weak settings, outdated encryption, and trusted tools left unprotected.These attacks don’t depend on zero-days. They work by staying unnoticed”, slipping through the cracks in what we monitor and what we assume is safe. What once looked suspicious…
-
Trend Micro integriert die Nvidia Enterprise AI Factory – KI-Sicherheitsplattform für Cloud- und On-Premises-Daten
First seen on security-insider.de Jump to article: www.security-insider.de/ki-sicherheitsplattform-fuer-cloud-und-on-premises-daten-a-59c50ff4658cd0733d88b16a08a996ea/
-
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose a severe threat to managed AI cloud services.The vulnerability, tracked as CVE-2025-23266, carries a CVSS score of 9.0 out of 10.0. It has been codenamed NVIDIAScape by Google-owned cloud security company Wiz.”NVIDIA Container Toolkit for all platforms contains…
-
NVIDIA Container Toolkit Vulnerability Allows Privileged Code Execution by Attackers
NVIDIA has released critical security updates addressing two significant vulnerabilities in its Container Toolkit and GPU Operator that could allow attackers to execute arbitrary code with elevated privileges. The vulnerabilities, discovered in July 2025, affect all versions of the Container Toolkit up to 1.17.7 and GPU Operator up to 25.3.0, prompting immediate security patches and…
-
Nvidia-GPUs anfällig für Rowhammer-Angriffe
Cyberkriminelle könnten über einen Rowhammer-Angriff auf Nvidia-GPUs zugreifen.Nvidia hat kürzlich eine Sicherheitswarnung an Anwendungsentwickler, Computerhersteller und IT-Verantwortliche herausgegeben, dass moderne Speicherchips in Grafikprozessoren potenziell anfällig für sogenannte Rowhammer-Exploits sind. Bereits zuvor hatten kanadische Universitätsforscher nachgewiesen, dass eine Nvidia A6000 GPU mit einem ähnlichen Angriff erfolgreich kompromittiert werden kann.Bei einem Rowhammer-Angriff handelt es sich um eine…
-
Trump Lifts Nvidia Chip Restrictions to China, Raising Concerns
Analysts Warn White House Chip Reversal Threatens US AI Dominance. President Donald Trump has reportedly reversed a U.S. policy restricting Nvidia chips critical to artificial intelligence technology development from being exported to China in a move that experts say could undercut the U.S. lead in the burgeoning emerging technology market. First seen on govinfosecurity.com Jump…

