AI Pulse: Election Deepfakes, Disasters, Scams & more

Credit to Author: AI Team| Date: Thu, 31 Oct 2024 00:00:00 +0000

In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go.

Read more

How to Mitigate the Impact of Rogue AI Risks

Credit to Author: AI Team| Date: Thu, 17 Oct 2024 00:00:00 +0000

This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

AI Pulse: What’s new in AI regulations?

Credit to Author: AI Team| Date: Mon, 30 Sep 2024 00:00:00 +0000

Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.

Read more

Cybersecurity Compass: Bridging the Communication Gap

Credit to Author: Juan Pablo Castro| Date: Thu, 26 Sep 2024 00:00:00 +0000

Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach.

Read more

Identifying Rogue AI

Credit to Author: AI Team| Date: Thu, 19 Sep 2024 00:00:00 +0000

This is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

How AI Goes Rogue

Credit to Author: AI Team| Date: Tue, 03 Sep 2024 00:00:00 +0000

This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem

Credit to Author: Abdelrahman Esmail| Date: Wed, 28 Aug 2024 00:00:00 +0000

A technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.

Read more

Complete Guide to Protecting Seven Attack Vectors

Credit to Author: Jon Clay| Date: Tue, 27 Aug 2024 00:00:00 +0000

The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews seven key initial attack vectors and provides proactive security tips to help you reduce cyber risk across the attack surface.

Read more