OpenAI sees increasing use of its AI models for influencing elections – ET CISO https://etimg.etb2bimg.com/thumb/msid-114107905,imgsize-22566,width-1200,height=765,overlay-etciso/ot-security/openai-sees-increasing-use-of-its-ai-models-for-influencing-elections.jpg – OpenAI has seen a number of attempts where its AI models have been used to generate fake content, including long-form articles and social media comments, aimed at influencing elections, the ChatGPT maker said in a report on Wednesday. Cybercriminals are increasingly using AI tools, ...
Read More »Yearly Archives: 2024
Strategies for remediating supply chain attacks, ET CISO
Strategies for remediating supply chain attacks, ET CISO In a world where code is the new currency, supply chain attacks are the heist of the digital age. Recent findings reveal a chilling trend: as open-source repositories become the playground for cybercriminals, the lack of oversight makes them particularly inviting targets. According to the 2024 Reversing Labs report, we witnessed a ...
Read More »N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware
N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware https://firewall.firm.in/wp-content/uploads/2024/10/attack.png Oct 09, 2024Ravie LakshmananPhishing Attack / Malware Threat actors with ties to North Korea have been observed targeting job seekers in the tech industry to deliver updated versions of known malware families tracked as BeaverTail and InvisibleFerret. The activity cluster, tracked as CL-STA-0240, is part of a ...
Read More »Scientists sound AI alarm after winning physics Nobel – ET CISO
Scientists sound AI alarm after winning physics Nobel – ET CISO https://etimg.etb2bimg.com/thumb/msid-114069094,imgsize-43982,width-1200,height=765,overlay-etciso/next-gen-tech/scientists-sound-ai-alarm-after-winning-physics-nobel.jpg American Geoffrey Hinton and British-Canadian John Hopfield won the Nobel physics prize on Tuesday for their pioneering work on the foundations of artificial intelligence, with both sounding the alarm over the technology they helped bring to life. The pair’s research on neural networks in the 1980s paved the ...
Read More »Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale
Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale https://firewall.firm.in/wp-content/uploads/2024/10/online-scam.png Oct 09, 2024Ravie LakshmananCybercrime / Threat Detection Google on Wednesday announced a new partnership with the Global Anti-Scam Alliance (GASA) and DNS Research Federation (DNS RF) to combat online scams. The initiative, which has been codenamed the Global Signal Exchange (GSE), is designed to create ...
Read More »Cyber security firm Artic Wolf opens first India GCC in Bengaluru – ET CISO
Cyber security firm Artic Wolf opens first India GCC in Bengaluru – ET CISO https://etimg.etb2bimg.com/thumb/msid-114069290,imgsize-75786,width-1200,height=765,overlay-etciso/corporate/cyber-security-firm-artic-wolf-opens-first-india-gcc-in-bengaluru.jpg US-based cyber security firm, Arctic Wolf Tuesday announced the launch of its first Indian Global Capability Centre (GCC) in Bengaluru. The US-based firm plans to recruit 150 employees by mid-2025, especially in roles related to core R&D areas like threat intelligence and artificial intelligence (AI). ...
Read More »AI-powered threat detection and response, IT Security News, ET CISO
AI-powered threat detection and response, IT Security News, ET CISO Madhan Raj J, Associate Vice President, Cobalt Cloud Solution Strategist, Infosys In today’s world of digitization, enterprises are highly challenged to keep their business-sensitive data protected from internal and external threats. With an interconnected business ecosystem, enterprise digital boundaries are stretching beyond their direct control limits. As threats from malicious ...
Read More »Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries
Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries https://firewall.firm.in/wp-content/uploads/2024/10/hackers.png Oct 09, 2024Ravie LakshmananIndustrial Security / Critical Infrastructure Details have emerged about multiple security vulnerabilities in two implementations of the Manufacturing Message Specification (MMS) protocol that, if successfully exploited, could have severe impacts in industrial environments. “The vulnerabilities could allow an attacker to crash an industrial device or in ...
Read More »Telecommunications: The cornerstone for AI for good, responsible regulations & cybersecurity – ET CISO
Telecommunications: The cornerstone for AI for good, responsible regulations & cybersecurity – ET CISO https://etimg.etb2bimg.com/thumb/msid-114069372,imgsize-118702,width-1200,height=765,overlay-etciso/ot-security/telecommunications-the-cornerstone-for-ai-for-good-responsible-regulations-cybersecurity.jpg Predicting the future is not magic, it’s AI!” – Dave Waters, Supply Chain Today. As the world gains more intelligence ‘artificially’, there is nothing impossible ‘virtually’. Artificial Intelligence (AI) and Machine Learning (ML) have become integral parts of almost all sectors worldwide, India being no ...
Read More »Cyber attackers & defenders get a boost from generative AI, IT Security News, ET CISO
Cyber attackers & defenders get a boost from generative AI, IT Security News, ET CISO Generative AI is now at the centre of a highstakes arms race in the digital realm, forcing both cybersecurity defenders and attackers to adapt rapidly. “As organisations transition from discrete GenAI pilots to enterprise-wide implementations, security risks are increasing given the scale and complexity of ...
Read More »