Codex Exposed: Helping Hackers in Training?
Credit to Author: Forward-Looking Threat Research Team| Date: Thu, 03 Feb 2022 00:00:00 +0000
How useful is the Codex code generator as a potential training tool?
Read moreCredit to Author: Forward-Looking Threat Research Team| Date: Thu, 03 Feb 2022 00:00:00 +0000
How useful is the Codex code generator as a potential training tool?
Read moreCredit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.
Read moreCredit to Author: Forward-Looking Threat Research Team| Date: Fri, 14 Jan 2022 00:00:00 +0000
In a series of blog posts, we explore different aspects of Codex and assess its capabilities with a focus on the security aspects that affect not only regular developers but also malicious users. This is the second part of the series.
Read moreCredit to Author: Jon Clay| Date: Fri, 14 Jan 2022 00:00:00 +0000
This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.
Read moreCredit to Author: Forward-Looking Threat Research Team| Date: Fri, 07 Jan 2022 00:00:00 +0000
The first of a series of blog posts examines the security risks of Codex, a code generator powered by the GPT-3 engine.
Read moreCredit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.
Read moreCredit to Author: Jon Clay| Date: Fri, 17 Dec 2021 00:00:00 +0000
This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.
Read moreCredit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000
This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.
Read more