article thumbnail

Report on the Malicious Uses of AI

Schneier on Security

A significant number appeared to originate in China: Four of the 10 cases in this report, spanning social engineering, covert influence operations and cyber threats, likely had a Chinese origin. Wall Street Journal article (also here ). Slashdot thread.

article thumbnail

Rogue AI is the Future of Cyber Threats

Trend Micro

Later articles will include technical guidance, case studies and more. This is the first blog in a series on Rogue AI.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Small Business Are Suffering Breaches – And Going Bust – Because They Don’t Have Access to Cyber-Threat Intelligence

Joseph Steinberg

In a future piece I will explore the various types of threat intelligence – stay tuned. The post Small Business Are Suffering Breaches – And Going Bust – Because They Don’t Have Access to Cyber-Threat Intelligence appeared first on Joseph Steinberg.

article thumbnail

Top Cyber Threats Automotive Dealerships Should Look Out For

Security Boulevard

A combination of storing lots of sensitive customer data, handling large financial transactions, increased dependence on digital technologies and a perception of immature cybersecurity all combine to create a perception of dealerships as lucrative targets for threat actors.

article thumbnail

Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies

Tech Republic Security

Cyber threat hunting combines strategies, advanced technologies and skilled analysts to methodically examine networks, endpoints and data repositories. Its objective is to uncover stealthy malicious activities, reduce dwell time for undetected threats and bolster an organization’s capability to withstand multi-vector attacks.

article thumbnail

Why CISOs Are Stepping Away and What the Future Holds

SecureWorld News

Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities. The article appeared originally on Medium here.

CISO 105
article thumbnail

Joseph Steinberg On The World Of CyberSecurity: An Interview

Joseph Steinberg

Steinberg: While I’ve been involved in many interesting projects over the past few decades, I’m proudest about having helped many people without technology backgrounds stay safe from cyber threats.