How AI Goes Rogue
Credit to Author: AI Team| Date: Tue, 03 Sep 2024 00:00:00 +0000
This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.
Read moreCredit to Author: AI Team| Date: Tue, 03 Sep 2024 00:00:00 +0000
This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.
Read moreCredit to Author: Mohamed Fahmy| Date: Thu, 29 Aug 2024 00:00:00 +0000
Threat actors are targeting users in the Middle East by distributing sophisticated malware disguised as the Palo Alto GlobalProtect tool.
Read moreCredit to Author: AI Team| Date: Thu, 29 Aug 2024 00:00:00 +0000
This issue of AI Pulse is all about agentic AI: what it is, how it works, and why security needs to be baked in from the start to prevent agentic AI systems from going rogue once they’re deployed.
Read moreCredit to Author: Abdelrahman Esmail| Date: Wed, 28 Aug 2024 00:00:00 +0000
A technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.
Read moreCredit to Author: Jon Clay| Date: Tue, 27 Aug 2024 00:00:00 +0000
The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews seven key initial attack vectors and provides proactive security tips to help you reduce cyber risk across the attack surface.
Read moreCredit to Author: Sara Atie| Date: Thu, 22 Aug 2024 00:00:00 +0000
Enterprises have gone all-in on GenAI, but the more they depend on AI models, the more risks they face. Trend Vision One™ – Zero Trust Secure Access (ZTSA) – AI Service Access bridges the gap between access control and GenAI services to protect the user journey.
Read moreCredit to Author: AI Team| Date: Thu, 15 Aug 2024 00:00:00 +0000
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Read moreCredit to Author: Eva Chen| Date: Sun, 04 Aug 2024 00:00:00 +0000
This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments.
Read moreCredit to Author: Juan Pablo Castro| Date: Fri, 02 Aug 2024 00:00:00 +0000
Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach.
Read moreCredit to Author: Jaromir Horejsi| Date: Thu, 01 Aug 2024 00:00:00 +0000
We uncovered a malvertising campaign where the threat actor hijacks social media pages, renames them to mimic popular AI photo editors, then posts malicious links to fake websites.
Read more