With hundreds of AI models found to harbor malicious code, cybersecurity firms are releasing technology to help companies manage their AI development and deployment efforts.
Автор: Robert Lemos, Contributing Writer
Ransomware Attacks Build Against Saudi Construction Firms
Cybercriminals are ramping up their efforts in the Kingdom and targeting more than just petroleum firms; now, they’re aiming for Middle East organizations in the IT, government, construction, and real estate sectors too.
Third-Party Risk Top Cybersecurity Claims
Data collected by cyber-insurers show that ransomware accounts for the majority of insurance claims, but that much of the losses stem from third-party breaches affecting policyholders.
Third-Party Risk Top Cybersecurity Claims
Data collected by cyber-insurers show that ransomware accounts for the majority of insurance claims, but that much of the losses stem from third-party breaches affecting policyholders.
Targeted by Ransomware, Middle East Banks Shore Up Security
As the UAE financial sector finished up its annual cyberattack exercise, its worries about ransomware compromises and geopolitical attacks are on the rise.
Generative AI Shows Promise for Faster Triage of Vulnerabilities
A host of automated approaches identifies and remediates potential vulns while still retaining a role for security analysts to filter for context and business criticality.
Industrial System Cyberattacks Surge as OT Stays Vulnerable
Nearly a third of organizations have an operational system connected to the Internet with a known exploited vulnerability, as attacks by state and non-state actors increase.
Nations Open ‘Data Embassies’ to Protect Critical Info
Estonia and Monaco back up their citizens’ information to a data center in Luxembourg, while Singapore looks to India as its safe haven for data. But geopolitical challenges remain.
Content Credentials Show Promise, But Ecosystem Still Young
While AI-generation services and major camera makers are adopting the specification for digitally signed metadata, creating a workflow around the nascent ecosystem is still a challenge.
North Korea’s Kimsuky Taps Trusted Platforms to Attack South Korea
The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.