Protect AI bought one of the world's largest certified naming authorities to create a bug bounty platform focused exclusively on AI and ML open-source software. The acquisition will allow customers to discover exploits in the AI or ML supply chain weeks before they're publicly revealed.
In the latest weekly update, ISMG editors discuss the White House's debut of a $20 million contest to exterminate bugs with AI, a New York man admitting to being behind the Bitfinex hack, and a new malware campaign that is targeting newbie cybercriminals in order to steal sensitive information.
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Aaron Cockerill of Lookout discussed the benefits and concerns associated with generative AI and how to solve challenges related to zero-day attacks, misconfigurations, the cyber skills gap and privacy.
In an after-action report on how the Lapsus$ crime group hacked "dozens of well-defended companies with low-complexity attacks," the U.S. Cyber Safety Review Board urges organizations to implement more robust two-factor authentication systems, plus regulations to combat SIM swapping.
Threat actors are taking control of cloud-based Microsoft 365 accounts of C-suite executives using a multifactor authentication phishing tool. Proofpoint researchers say attackers use automation to identify in real time whether a phished user is a high-level profile company official.
In the latest "Proof of Concept," Mike Baker, VP/IT CISO at DXC Technology and a CyberEdBoard member, and Chris Hughes, co-founder and CISO at Aquia, join ISMG editors to explore the state of the software supply chain, MOVEit breaches and the role of SBOMs and transparency in software development.
In this week's roundup of digital assets-related cybersecurity incidents, Fireblocks found bugs in 15 crypto wallets, Curve Finance recouped most stolen funds, ethereum saw a high flow of illicit funds, the NFT faded more, the U.K. posted crypto crimes jobs and South Korea arrested Bitsonic's CEO.
Ransomware incidents are down, but the volume and impact of targeted attacks are on the rise. These are among the findings of the new Global Threat Landscape Report from Fortinet's FortiGuard Labs. Fortinet's Derek Manky shares analysis of this report and insights on the cybersecurity trends that will influence how we...
U.S. President Joe Biden signed an executive order limiting investment in Chinese companies that develop advanced technologies including artificial intelligence. The order is the latest national security barrier the United States has mounted against Chinese access to American markets and investment.
The White House has launched an Artificial Intelligence Cyber Challenge, backed by DARPA and offering nearly $20 million in prizes, to develop a new generation of tools that can rapidly find and fix software vulnerabilities in both commercial and open-source code.
Japanese classified military networks reportedly suffered a massive breach in 2020 at the hands of a Chinese cyberespionage group that proved tough to eject. One cybersecurity expert said Chinese cyberespionage groups targeting Japan and its allies are employing ever more "stealthy intrusions."
Citing several growing concerns, Sen. Mark Warner, D-Va., on Tuesday sent a letter quizzing Google CEO Sundar Pichai about how the tech giant is applying privacy, trust and ethical "guardrails" around the development and use of its generative AI product, Med-PaLM 2, in patient care settings.
Collaborative AI - the process of one AI model learning from another - is one of the most effective ways for financial institutions to fight the sophisticated techniques fraudsters use for scams, said Johan Gerber, executive vice president of security and cyber innovation at Mastercard.
Generative AI can detect malicious behavior undetectable by traditional forms of AI such as adversaries stealing sensitive data by sticking it in images, said Netskope CEO Sanjay Beri. Netskope has over 50 machine-learning models in production and has debuted AI-based DLP and threat detection tools.
OpenText acquired several cyber companies in recent years to protect sensitive information and data everywhere from consumer to large enterprise environments, said EVP Prentiss Donohue. The Micro Focus buy shored up OpenText's offerings around application and data security and identity management.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.