Tag: ai
-
We can’t make this stuff up: tech companies Palantir and Anduril form fellowship for AI adventures
by
in SecurityNews
Tags: aiMeanwhile, Sauron secures funding. Really First seen on theregister.com Jump to article: www.theregister.com/2024/12/09/palantir_anduril_alliance/
-
Trust Issues in AI
by
in SecurityNewsFor a technology that seems startling in its modernity, AI sure has a long history. Google Translate, OpenAI chatbots, and Meta AI image generators are built on decades of advancements in linguistics, signal processing, statistics, and other fields going back to the early days of computing”, and, often, on seed funding from the U.S. Department…
-
Compromised AI Library Delivers Cryptocurrency Miner via PyPI
The compromised ultralytics AI library delivered XMRig miner via GitHub Actions exploit First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ai-library-delivers-cryptocurrency/
-
âš¡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
by
in SecurityNewsThis week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even the smartest of us. On the other side, the good guys are busting secret online markets and kicking out shady chat rooms, while big companies…
-
Maximizing SAP Security: How AI and Human Intervention Work
by
in SecurityNewsTips toward improving the security rating of your code base while preventing any new vulnerabilities from appearing in your SAP landscape. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/maximizing-sap-security-how-ai-and-human-intervention-work/
-
Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI
by
in SecurityNewsDetails have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack.Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found that…
-
Public and private sectors must partner to address generative AI’s interdependent energy and security requirements
by
in SecurityNewsCollaboration across government and industry is the only way to protect energy infrastructure in the generative AI age, a former ODNI official argues. First seen on cyberscoop.com Jump to article: cyberscoop.com/generative-ai-interdependent-energy-security/
-
Microsoft dangles $10K for hackers to hijack LLM email service
Outsmart an AI, win a little Christmas cash First seen on theregister.com Jump to article: www.theregister.com/2024/12/09/microsoft_llm_prompt_injection_challenge/
-
Ultralytics AI Library with 60M Downloads Compromised for Cryptomining
by
in SecurityNewsAnother day, another supply chain attack! First seen on hackread.com Jump to article: hackread.com/ultralytics-ai-library-compromised-for-cryptomining/
-
Ultralytics YOLO AI model compromised in supply chain attack
by
in SecurityNewsWhile Ultralytics has not released an official security advisory, the company pulled two recent versions of its YOLO11 AI model after reports emerged that they contained a cryptominer. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366616877/Ultralytics-YOLO-AI-model-compromised-in-supply-chain-attack
-
Ultralytics YOLO AI model compromised in supply chain attack
by
in SecurityNewsWhile Ultralytics has not released an official security advisory, the company pulled two recent versions of its YOLO11 AI model after reports emerged that they contained a cryptominer. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366616877/Ultralytics-YOLO-AI-model-compromised-in-supply-chain-attack
-
Maximizing SAP Security: How AI and Human Intervention Work
by
in SecurityNewsTips toward improving the security rating of your code base while preventing any new vulnerabilities from appearing in your SAP landscape. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/maximizing-sap-security-how-ai-and-human-intervention-work/
-
Cyber-Bedrohungen 2024: Trends und Ausblick
by
in SecurityNewsCyberkriminelle haben 2024 mit QR-Code-Betrug, KI-gestützten Angriffen und Supply-Chain-Exploits neue Maßstäbe gesetzt. Unternehmen stehen vor einer wachsenden Bedrohungslandschaft, die ausgeklügelte Sicherheitsmaßnahmen erfordert, um proaktiv auf die Herausforderungen von 2025 vorbereitet zu sein. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/cybersecurity/cyber-bedrohungen-2024-trends-und-ausblick/
-
Möglichkeiten der künstlichen Intelligenz – Das steckt hinter dem KI-Hype in der Cybersicherheit
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/kuenstliche-intelligenz-und-it-sicherheit-deutschen-unternehmen-a-26a2ddddd3272441881ae889d4116e0a/
-
Gen AI use cases rising rapidly for cybersecurity, but concerns remain
by
in SecurityNews
Tags: ai, attack, automation, awareness, ceo, ciso, compliance, control, cybersecurity, data, detection, finance, framework, fraud, GDPR, governance, grc, group, guide, Hardware, HIPAA, incident response, intelligence, international, malware, middle-east, monitoring, phishing, privacy, RedTeam, regulation, risk, risk-assessment, risk-management, soc, software, strategy, technology, threat, tool, training, usaGenerative AI is being embedded into security tools at a furious pace as CISOs adopt the technology internally to automate manual processes and improve productivity. But research also suggests this surge in gen AI adoption comes with a fair amount of trepidation among cybersecurity professionals, which CISOs must keep in mind when weaving gen AI…
-
Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
by
in SecurityNewsJoin us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn how her new book goes deeper into secure coding practices, backed by her……
-
Microsoft teases Copilot Vision, the AI sidekick that judges your tabs
by
in SecurityNewsEdge-exclusive tool promises ‘second set of eyes’ for browsing First seen on theregister.com Jump to article: www.theregister.com/2024/12/07/microsoft_copilot_vision/
-
Videoüberwachung von Bahnhöfen durch KI-gestützte Gesichtserkennung in Planung
by
in SecurityNews
Tags: aiDie CDU plant einen Ausbau der Videoüberwachung von Bahnhöfen mit Gesichtserkennung durch Künstliche Intelligenz (KI). First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/datenschutz/videoueberwachung-von-bahnhoefen-durch-ki-gestuetzte-gesichtserkennung-in-planung-305327.html
-
CrowdStrike hilft bei der Sicherung des EndEnd-KI-Ökosystems, das auf AWS aufbaut
by
in SecurityNewsDie erweiterte Integration bietet End-to-End-Transparenz und Schutz für KI-Innovationen, von LLMs bis hin zu Anwendungen, durch verbesserte Amazon SageMaker-Unterstützung, KI-Container-Scanning und AWS IAM Identity Center-Integration. Da Unternehmen ihre Innovationen in der Cloud und die Einführung von KI beschleunigen, ist die Sicherung von KI-Workloads und -Identitäten von entscheidender Bedeutung. Fehlkonfigurationen, Schwachstellen und identitätsbasierte Bedrohungen setzen… First…
-
Cybersicherheitsprognosen für 2025
by
in SecurityNewsGen veröffentlicht seine Cyberbedrohungsprognosen für 2025. Die Expert:innen von Gen sagen die nächste Phase von KI und Deepfakes voraus, eine Verschiebung von Datendiebstahl hin zu umfassendem Identitätsdiebstahl, sowie ausgefeiltere Betrügereien und neue Taktiken für finanziellen Diebstahl. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/cybersicherheitsprognosen-fuer-2025
-
Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions
by
in SecurityNewsIn yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner.The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package Index (PyPI) repository. A subsequently released version has introduced a security…
-
ML clients, ‘safe’ model formats exploitable through open-source AI vulnerabilities
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/ml-clients-safe-model-formats-exploitable-through-open-source-ai-vulnerabilities
-
Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data
by
in SecurityNewsCybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings.”The threat actors behind the malware have set up fake companies using AI to make them increase legitimacy,” Cado Security researcher Tara…
-
Philip Torr: Die Zukunft der KI liegt in unseren Händen | Highlights von Starmus
by
in SecurityNews
Tags: aiWir stehen an der Schwelle einer technologischen Revolution, die unser Leben verändern wird und wir haben die Macht, ihren Einfluss zu gestalten. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/we-live-progress/philip-torr-die-zukunft-der-ki-liegt-in-unseren-handen-highlights-von-starmus/
-
Supply chain compromise of Ultralytics AI library results in trojanized versions
by
in SecurityNewsAttackers have compromised Ultralytics YOLO packages published on PyPI, the official Python package index, by compromising the build environment of the popular library for creating custom machine learning models. The malicious code deployed cryptocurrency mining malware on systems that installed the package, but the attackers could have delivered any type of malware.According to researchers from…
-
Zero trust and AI driving observability interest
by
in SecurityNewsFor channel partners wondering where there should be pockets of revenue next year, there is a case to be made for deep observability First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366616820/Zero-trust-and-AI-driving-observability-interest
-
Trump’s AI, Crypto Czar David Sacks Faces Conflict Scrutiny
by
in SecurityNewsDavid Sacks Appointed as Trump’s AI and Crypto Czar Amid Growing Industry Concerns. President-elect Donald Trump’s appointment of former PayPal executive David Sacks to serve as the inaugural White House czar for artificial intelligence and cryptocurrency is already raising significant concerns about potential conflicts of interest and market favoritism. First seen on govinfosecurity.com Jump to…
-
Microsoft Expands Access to Windows Recall AI Feature
The activity-recording capability has drawn concerns from the security community and privacy experts, but the tech giant is being measured in its gradual rollout, which is still in preview mode. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/microsoft-expands-access-windows-recall-ai-feature
-
AWS Uses AI for New Cyberthreat Detection Service
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/aws-uses-ai-for-new-cyberthreat-detection-service