Tag: ml
-
The Weaponization of AI and ML is Complicating the Digital Battlefield
by
in SecurityNewsZero-trust architecture is increasingly seen as a solution to the challenges posed by AI and ML. Initial training must focus on standardizing basic te… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/the-weaponization-of-ai-and-ml-is-complicating-the-digital-battlefield/
-
Researchers Disclosed 20 Vulnerabilities Exploited To Attack ML Used In Orgs
by
in SecurityNewsThe MLOps pipeline automates the machine learning lifecycle, from model training to deployment, which involves defining the pipeline using Python code… First seen on gbhackers.com Jump to article: gbhackers.com/20ml-vulnerabilities-exposed/
-
How to Maximize Network Security With AI and ML
by
in SecurityNewsFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/how-to-maximize-network-security-with-ai-and-ml/
-
Protect AI Raises $60 Million in Series B Funding
by
in SecurityNewsAI and ML security provider Protect AI has raised $60 million in a Series B funding round led by Evolution Equity Partners. The post Protect AI Raises… First seen on securityweek.com Jump to article: www.securityweek.com/protect-ai-raises-60-million-in-series-b-funding/
-
How U.S. Businesses can Fight the Deepfake Threat
by
in SecurityNewsWhile it’s unclear how new, advanced technologies like AI and ML will ultimately change the data security landscape, now is not the time to stand stil… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/how-u-s-businesses-can-fight-the-deepfake-threat/
-
Diversifying cyber teams to tackle complex threats
Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahor… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/10/diverse-cyber-workforce/
-
CVSS 10: Lücke in KI-Framework PyTorch gefährdet Netzwerke – ML-Framework PyTorch ermöglicht Cyberattacken
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/kritische-luecke-pytorch-sicherheitstipps-updates-a-b036731dce3c4657d3070df45865f02e/
-
Balancing AI Performance and Safety: Lessons from PyData Berlin
by
in SecurityNewsWould you trust AI to call 911? GitGuardian’s ML engineer Nicolas posed this question at PyData Berlin, sparking a discussion on integrating ML into c… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/balancing-ai-performance-and-safety-lessons-from-pydata-berlin/
-
‘Sleepy Pickle’ Exploit Subtly Poisons ML Models
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/sleepy-pickle-exploit-subtly-poisons-ml-models
-
Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users
Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or manip… First seen on gbhackers.com Jump to article: gbhackers.com/sleepy-pickle-exploit-ml-models/
-
Hackers Leverage AI as Application Security Threats Mount
by
in SecurityNewsReverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying tre… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/hackers-leverage-ai-as-application-security-threats-mount/
-
Better identity threat detection sought by new Semperis ML-based tool
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/better-identity-threat-detection-sought-by-new-semperis-ml-based-tool
-
OWASP Machine Learning Security Top 10 – Die zehn größten Bedrohungen für ML
by
in SecurityNews
Tags: mlFirst seen on security-insider.de Jump to article: www.security-insider.de/owasp-machine-learning-security-top-ten-praevention-tipps-a-a08c7daf6182210641732aea275fa2f5/
-
Watch: Behavior Doesn’t Lie: The Power of ML for Identity Threat Detection and Response
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizatio… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/watch-behavior-doesnt-lie-the-power-of-ml-for-identity-threat-detection-and-response/
-
Vulnerabilities for AI and ML Applications are Skyrocketing
by
in SecurityNewsIn their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code Execution indicates an… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/vulnerabilities-for-ai-and-ml-applications-are-skyrocketing/
-
Why MLBOMs Are Useful for Securing the AI/ML Supply Chain
by
in SecurityNewsA machine learning bill of materials (MLBOM) framework can bring transparency, auditability, control, and forensic insight into AI and ML supply chain… First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/mlboms-are-useful-for-securing-ai-ml-supply-chain
-
Beschleunigte Bereitstellung von ML-Apps – Sichere Workflows für Machine Learning Operations
by
in SecurityNews
Tags: mlFirst seen on security-insider.de Jump to article: www.security-insider.de/sichere-workflows-fuer-machine-learning-operations-a-76bc1a93b87d6efe4cc17617097559cd/
-
ML Model Repositories: The Next Big Supply Chain Attack Target
by
in SecurityNewsMachine-learning model platforms like Hugging Face are suspectible to the same kind of attacks that threat actors have executed successfully for years… First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/ml-model-repositories-next-big-supply-chain-attack-target
-
Malicious AI models on Hugging Face backdoor users’ machines
by
in SecurityNewsAt least 100 instances of malicious AI ML models were found on the Hugging Face platform, some of which can execute code on the victim’s machine, givi… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/malicious-ai-models-on-hugging-face-backdoor-users-machines/
-
Künstliche Intelligenz und Machine Learning in der Cyberabwehr – Mit KI und ML den Angreifern einen Schritt voraus sein
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/mit-ki-und-ml-den-angreifern-einen-schritt-voraus-sein-a-99095fcb57595b153173758289fc2d10/
-
ML-basierte XDR-Lösungen: Das Schweizer Messer der IT-Sicherheit
by
in SecurityNewsMittels einer XDR-Plattform ist es möglich, Sicherheitsteams einen ganzheitlichen Überblick über Netzwerke, Cloud-Workloads und Server zu liefern. Hin… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ml-basierte-xdr-loesungen-das-schweizer-messer-der-it-sicherheit/a33432/
-
Palo Alto Networks stellt neue Zero Trust OT Security-Lösung vor
by
in SecurityNewsMit der ML-basierten OT-Visibility-Engine erkennt der Industrial OT Security-Service Hunderte von einzigartigen OT-Geräteprofilen, über 1.000 OT/Indus… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/palo-alto-networks-stellt-neue-zero-trust-ot-security-loesung-vor/a33571/
-
JFrog und AWS beschleunigen die sichere Entwicklung von Machine Learning
by
in SecurityNews
Tags: mlZusammen mit seiner Amazon SageMaker-Integration hat JFrog neue Versionierungsfunktionen für seine ML-Modell-Management-Lösung vorgestellt. Diese inte… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/jfrog-und-aws-beschleunigen-die-sichere-entwicklung-von-machine-learning/a36317/