Social engineering and phishing are not just IT buzzwords; they are potent threats capable of causing devastating damage to your organization. Bad actors and the technology they use to infiltrate your defenses are evolving at lightning speed. The only way to safeguard your assets and data is to stay ahead of the game...
Like security practitioners, cybercriminals want AI too. But in the AI-versus-AI cyber battle, the barrier for malicious actors "keeps getting lower and lower, while the barrier for defenders is getting more complex and more difficult," said Rick Holland, field CISO, ReliaQuest.
Researchers have found a new way of poisoning machine learning models that could allow hackers to steal data and manipulate the artificial intelligence unit's output. Using the Sleepy Pickle attack method, hackers can inject malicious code into the serialization process, said Trail of Bits.
While AI has spurred the growth of authentication controls, it has also enabled voice cloning and video deepfakes to become much more convincing. Fraud fighters are looking at adopting a multifactor authentication system using multimodal biometrics to fight against deepfakes.
Lior Div, former CEO and co-founder of Cybereason, discusses how hackers use artificial intelligence to become smarter and more effective. He also emphasizes that cybersecurity defenders need to harness the power of AI more than ever to stay ahead of attackers.
Generative AI has ushered in a new era of cybersecurity, presenting opportunities for innovation while also posing threats to AI models. "It's a curse and a blessing," and the state of cybersecurity is "vibrant" and experiencing a "golden age," said Dave DeWalt, founder and CEO, NightDragon.
Security leaders convened at the Cybersecurity Implications of AI Summit to explore AI's potential for defense while navigating privacy, compliance and ethical considerations. Key sessions covered safeguarding data privacy, Washington's AI Task Force and a tabletop exercise on deepfake attacks.
Banks are concerned about advancements in voice-cloning technology and the threat it poses to authentication. The failure of identity-centric solutions to combat synthetic identity fraud has convinced 91% of U.S. banks to reconsider their use of voice verification for major customers.
Generative AI tools, such as ChatGPT and GitHub Copilot, hold promise for cybersecurity enhancement. Kevin Schmidt, director analyst at Gartner, explores AI's potential for bug detection, threat monitoring and easing SOC burdens, along with organizational challenges.
In the latest weekly update, four ISMG editors discussed the unending twists and turns in the Change Healthcare cyberattack, positive signs of economic recovery in the cybersecurity tech market, and how artificial intelligence is shaking up supply chain security.
Employers can now fire an employee who complains about sexual harassment, take a cut of their workers' tips and serve customers cheese nibbled on by rats: at least according to advice doled out by New York City's AI chatbot meant to help small business owners navigate the city's bureaucratic maze.
AI is on the way to embedding itself in our daily lives. CISO Sam Curry and his brother, CMO Red Curry, discuss what generative AI means for copyrights and plagiarism, the "AI bubble," and whether governing AI-derived speech will wind up limiting free speech.
Artificial intelligence technologies such as generative AI are not helping fraudsters create new types of scams. They are doing just fine relying on the traditional scams, but the advent of AI is helping them scale up attacks and snare more victims, according to researchers at Visa.
The U.S. healthcare sector needs to closely watch government regulatory and legislative developments involving artificial intelligence, including the European Union AI Act, said Lee Kim, senior principal of cybersecurity and privacy at the Healthcare Information and Management Systems Society.
The rapid rise of artificial intelligence technologies poses new risks. Enterprises using AI must regularly scan for prompt injection attacks, implement transparency in the supply chain and reinforce built-in software controls to serve their company's security needs, Microsoft said.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.