Rogue AI is the Future of Cyber Threats
Credit to Author: AI Team| Date: Thu, 15 Aug 2024 00:00:00 +0000
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Read moreCredit to Author: AI Team| Date: Thu, 15 Aug 2024 00:00:00 +0000
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Read moreCredit to Author: AI Team| Date: Tue, 30 Jul 2024 00:00:00 +0000
The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more.
Read moreCredit to Author: Greg Young| Date: Mon, 29 Jul 2024 00:00:00 +0000
It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.
Read moreCredit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: AI Team| Date: Fri, 28 Jun 2024 00:00:00 +0000
AI Pulse is a new blog series from Trend Micro on the latest cybersecurity AI news. In this edition: Siri says hi to OpenAI, fraud hogs the AI cybercrime spotlight, and why the Paris Olympics could be a hotbed of deepfakery.
Read moreCredit to Author: Ahmed Mohamed Ibrahim | Date: Fri, 28 Jun 2024 00:00:00 +0000
We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner.
Read moreCredit to Author: Dustin Childs| Date: Tue, 25 Jun 2024 00:00:00 +0000
The latest Omdia Vulnerability Report shows Trend MicroTM Zero Day InitiativeTM (ZDI) spearheaded 60% of 2023 disclosures, underscoring its role in cybersecurity threat prevention.
Read moreCredit to Author: Sunil Bharti| Date: Thu, 06 Jun 2024 00:00:00 +0000
We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project.
Read moreCredit to Author: Sunil Bharti| Date: Thu, 30 May 2024 00:00:00 +0000
Water Sigbin (aka the 8220 Gang) exploited the Oracle WebLogic vulnerabilities CVE-2017-3506 and CVE-2023-21839 to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against.
Read moreCredit to Author: Shannon Murphy| Date: Tue, 28 May 2024 00:00:00 +0000
Get our take on the RSA 2024 conference where we review some of the major topics covered such as AI and data governance.
Read more