Security News

Bob February 23, 2024 11:47 AM. I actually gave a presentation recently where I pointed out that it is inevitable that AI will be used to carry out attacks that change by the nanosecond, and that's going to be happening sooner than later. We currently find ourselves in the early stages of a brand new arms race.

Microsoft's Windows Photos app now has its own generative erase tool that enables users to replace unwanted objects with AI-generated content. This feature is rolling out to Windows Insiders in all channels today, including systems running Windows 10 in the Release Preview Channel.

Microsoft has released an open access automation framework called PyRIT (short for Python Risk Identification Tool) to proactively identify risks in generative artificial intelligence (AI)...

To help SaaS companies attract and retain customers, Gartner identified four top priorities for software buyers in 2024. Software buyers are sensitive to price, and 31% have replaced their software because it costs too much.

Most cybersecurity professionals believe AI will significantly impact their jobs, according to a new survey by the International Information System Security Certification Consortium; with only 35% of the respondents having already witnessed AI's effects on their jobs. The impact is not necessarily a positive or negative impact, but rather an indicator that cybersecurity pros expect their jobs to change.

Microsoft announced that it caught Chinese, Russian, and Iranian hackers using its AI tools-presumably coding tools-to improve their hacking abilities. In collaboration with OpenAI, we are sharing threat intelligence showing detected state affiliated adversaries-tracked as Forest Blizzard, Emerald Sleet, Crimson Sandstorm, Charcoal Typhoon, and Salmon Typhoon-using LLMs to augment cyberoperations.

State and county officials have been urged to use paper ballots wherever possible over electronic ones, and ensure all election offices have procedures in place to handle potentially lethal substances, specifically fentanyl, anthrax, and ricin. On election threats, "We anticipate AI being leveraged for deception campaigns," said Michelle Alvarez, strategic threat analysis manager for IBM X-Force.

Google has announced that it's open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types. "Magika...

Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give IT network defenders and others better automated tools. Enter Magika, which uses a trained model to rapidly identify file types from file data, and it's an approach the Big G thinks works well enough to use in production.

Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. Webinar It has become possible to swiftly and inexpensively train, validate and deploy AI models and applications, yet while we embrace innovation, are we aware of the security risks?