DeepLocker: new breed of malware that uses AI to fly under the radar

DeepLocker: new breed of malware that uses AI to fly under the radar

IBM researchers are seeking to raise awareness that AI-powered threats are coming our way soon. To that end, they’ve created an all-new breed of malware to provide insights into how to reduce ...
Asian Dark Web Communities Thrive on Cultural Differences

Asian Dark Web Communities Thrive on Cultural Differences

A new report sheds light on the little-understood dark web markets in Asia, showing how they’re driven by cultural differences and local government policies. Researchers from IntSights Cyber Intelligence have investigated dark ...
Security Boulevard
We dont have artificial intelligence (yet) Algorithms are getting smarter, but experts are more important Stop throwing algorithms on the wall - they are not spaghetti Understand your data and your algorithms Invest in people who know security (and have experience) Build systems that capture expert knowledge Think out of the box, history is bad for innovation

AI & ML IN CYBERSECURITY – Why Algorithms Are Dangerous

Join me for my talk about AI and ML in cyber security at BlackHat on Thursday the 9th of August in Las Vegas. I’ll be exploring the topics of artificial intelligence (AI) ...
AI/ML for Threat Intelligence

3 Reasons Why Companies Are Adopting AI/ML for Threat Intelligence

AI and ML increasingly are being considered in security solutions as a real value-add There are potential dangers lurking behind every digital corner and, increasingly, each threat becoming more sophisticated and difficult ...
Security Boulevard
Phishers’ Favorite Brands to Spoof

Phishers’ Favorite Brands to Spoof

Phishers are always looking for a better brand to spoof and improve their success rates. They’re quick to switch out brands to keep their bait fresh, too. Keeping the tally of their ...
Security Boulevard
OWASP Top 10 May Be Wrong

What You Think You Know about the OWASP Top 10 May Be Wrong

| | owasp, Vulnerabilities
The Open Web Application Security Project (OWASP) is an open community dedicated to the mission of enabling companies to develop, purchase and maintain applications and APIs that can be trusted.  Since 2003, ...
Security Boulevard
Going on the Offense: How to Eliminate Internal Threats

Going on the Offense: How to Eliminate Internal Threats

Over the past few years, we’ve observed significant changes in the types of conversations we’re having with CISOs. What used to be discussions about how to keep bad guys out has evolved ...
Attack inception: Compromised supply chain within a supply chain poses new risks

Attack inception: Compromised supply chain within a supply chain poses new risks

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the ...
US-CERT Warns About Attacks Against ERP Applications

US-CERT Warns About Attacks Against ERP Applications

The US-CERT arm of the U.S. Department of Homeland Security has issued an alert warning organizations about an increase in attacks targeting Enterprise Resource Planning (ERP) applications. The alert is based on ...
Security Boulevard
Rubrik Adds Cybersecurity App to Combat Ransomware

Rubrik Adds Cybersecurity App to Combat Ransomware

Rubrik today unfurled a security application that runs on top of its data management platform and leverages machine learning algorithms to combat security breaches such as ransomware. Soham Mazumdar, co-founder and chief ...
Security Boulevard
Loading...