Fake LockBit, Real Damage: Ransomware Samples Abuse Amazon S3 to Steal Data

Credit to Author: Jaromir Horejsi| Date: Wed, 16 Oct 2024 00:00:00 +0000

This article uncovers a Golang ransomware abusing Amazon S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions.

Read more

How to Mitigate the Impact of Rogue AI Risks

Credit to Author: AI Team| Date: Thu, 17 Oct 2024 00:00:00 +0000

This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data

Credit to Author: Jaromir Horejsi| Date: Wed, 16 Oct 2024 00:00:00 +0000

This article uncovers a Golang ransomware abusing AWS S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions.

Read more

Harnessing AI for Enhanced Security

Credit to Author: Fernando Cardoso| Date: Tue, 08 Oct 2024 00:00:00 +0000

A deep-dive into how AI-driven solutions from Trend Micro leveraging the NVIDIA AI Enterprise software platform are elevating security across critical industries

Read more

AI Pulse: What’s new in AI regulations?

Credit to Author: AI Team| Date: Mon, 30 Sep 2024 00:00:00 +0000

Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.

Read more

Identifying Rogue AI

Credit to Author: AI Team| Date: Thu, 19 Sep 2024 00:00:00 +0000

This is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

How AI Goes Rogue

Credit to Author: AI Team| Date: Tue, 03 Sep 2024 00:00:00 +0000

This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more