Security News

Amplo Global announced that its AI-powered platform is now available on the MicrosoftAppSource and Microsoft Azure Marketplace - their online stores providing applications and services for use on Azure. Brian Bell, Director at Microsoft's Commercial Marketplace, said, "On Microsoft Azure Marketplace and AppSource, customers around the world can easily find, buy, and deploy partner solutions they can trust, all certified and optimized to run on Azure. We're happy to welcome Amplo Global and their AmploFly4.0 solution to the growing Azure Marketplace ecosystem."

Business Email Compromise, is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely shouldn't, like wire money. BEC emails can be difficult to detect using security solutions because no malware is involved.

The IBM Db2 is a family of hybrid data-management products containing artificial intelligence, which can be used to analyze and manage both structured and unstructured data within enterprises. The lack of explicit memory protections "Allows any local users read-and-write access to that memory area," Trustwave researchers said, in their PoC exploit writeup for the bug, issued on Thursday.

NICE Actimize announced the launch of its newest platform, NICE Actimize Xceed, which integrates best-in-class AI, data intelligence, behavioral analytics, and insights within a unified cloud platform designed to bring agility to financial institutions of all sizes, including community and regional banks, that are looking to modernize their financial crime risk management solutions. With "Always On" AI-based technology, NICE Actimize Xceed's self-learning capabilities immediately and autonomously adapt to new threats, helping financial institutions meet today's dynamic risk management needs with laser accuracy, speed and simplicity, and without the need for a team of data scientists.

The new release includes some additional features and an improved interface for free platform users. Ai is a web-based platform that can be used for image labeling and for developing AI-based image recognition applications.

A study explores the possible range and risk of attacks from military robots and autonomous attack drones to AI-assisted stalking. A study published in the journal Crime Science analyzed a vast spectrum of AI-enabled crimes in the years ahead ranging from military robots and autonomous attack drones to AI-assisted stalking.

WekaIO introduced Weka AI, a transformative storage solution framework underpinned by the Weka File System that enables accelerated edge-to-core-to-cloud data pipelines. Weka AI enables chief data officers, data scientists and data engineers to accelerate genomics, medical imaging, the financial services industry, and advanced driver-assistance systems deep learning pipelines.

At a Wednesday session at Black Hat USA 2020, researchers with FireEye demonstrated how freely-available, open-source tools - which offer pre-trained natural language processing, computer vision, and speech recognition tools - can be used to create malicious the synthetic media. Social media companies often do not require high bars of credibility, and offer a platform for content to go viral, allowing anyone to create fake media that is believable.

Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism, according to a new UCL report. The study identified 20 ways AI could be used to facilitate crime over the next 15 years.

Throughout the data lifecycle there are a variety of risks and considerations to manage. Our research shows that exposure of just a single terabyte of data could cost you $129,324; now think about how many terabytes of data your organization stores today.