Regulating AI Behavior with a Hypervisor

Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To ...
Seceon Threat Detection

SeedPod Cyber and Seceon Join Forces to Offer Cybersecurity Solutions and CyberInsurance Savings for MSP/MSSPs

Seceon's MSP and MSSP Partners Gain Exclusive Cyber Insurance and Unmatched Savings for Excellence in Cybersecurity Standards.................. The post SeedPod Cyber and Seceon Join Forces to Offer Cybersecurity Solutions and CyberInsurance Savings ...

Poisoning AI Models

New research into poisoning AI models: The researchers first trained the AI models using supervised learning and then used additional “safety training” methods, including more supervised learning, reinforcement learning, and adversarial training ...

Security Analysis of Threema

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...

Threats of Machine-Generated Text

With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field: what the threats are, how ...

New Sophisticated Malware

Mandiant is reporting on a new botnet. The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth. In cases where ...

Bunnie Huang’s Plausibly Deniable Database

Bunnie Huang has created a Plausibly Deniable Database. Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size ...
Best Intelligent SIEM Vendor

Best Intelligent SIEM Vendor

Best Intelligent SIEM Vendor - Seceon SIEM tools help you simplify compliance reporting, with better access and visibility into networks, and high scalability. Nowadays, cyber-attacks are common than one can comprehend. With ...