INTERPOL & Trend’s Fight Against Cybercrime
Credit to Author: Jon Clay| Date: Thu, 12 Dec 2024 00:00:00 +0000
Trend threat intelligence and training were crucial to the success of two major policing operations in 2024
Read moreCredit to Author: Jon Clay| Date: Thu, 12 Dec 2024 00:00:00 +0000
Trend threat intelligence and training were crucial to the success of two major policing operations in 2024
Read moreCredit to Author: AI Team| Date: Sun, 01 Dec 2024 00:00:00 +0000
The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of agentic AI is going to take those possibilities to a whole new level.
Read moreCredit to Author: AI Team| Date: Thu, 31 Oct 2024 00:00:00 +0000
In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go.
Read moreCredit to Author: AI Team| Date: Thu, 17 Oct 2024 00:00:00 +0000
This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.
Read moreCredit to Author: AI Team| Date: Thu, 03 Oct 2024 00:00:00 +0000
This is the fourth blog post in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.
Read moreCredit to Author: AI Team| Date: Mon, 30 Sep 2024 00:00:00 +0000
Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.
Read moreCredit to Author: Juan Pablo Castro| Date: Thu, 26 Sep 2024 00:00:00 +0000
Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach.
Read moreCredit to Author: AI Team| Date: Thu, 19 Sep 2024 00:00:00 +0000
This is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.
Read moreCredit to Author: AI Team| Date: Tue, 03 Sep 2024 00:00:00 +0000
This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.
Read moreCredit to Author: Abdelrahman Esmail| Date: Wed, 28 Aug 2024 00:00:00 +0000
A technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.
Read more