Tag: ml
-
Cybersecurity Snapshot: Critical Infrastructure Orgs Found Vulnerable to Basic Hacks, While New MITRE Tool Uses ML to Predict Attack Chains
Report finds that many critical infrastructure networks can be breached using simple attacks. Plus, a new MITRE Engenuity tool uses machine learning t… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/cybersecurity-snapshot-critical-infrastructure-orgs-found-vulnerable-to-basic-hacks-while-new-mitre-tool-uses-ml-to-predict-attack-chains/
-
SC Award Winners 2024 Onyxia Cyber Best AI,ML Data Analytics Security Solution
First seen on scmagazine.com Jump to article: www.scmagazine.com/news/sc-award-winners-2024-onyxia-cyber-best-aiml-data-analytics-security-solution
-
Chrome switching to NIST-approved ML-KEM quantum encryption
Google announced updates in the post-quantum cryptographic key encapsulation mechanism used in the Chrome browser, specifically, the swap of Kyber use… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chrome-switching-to-nist-approved-ml-kem-quantum-encryption/
-
Nvidia AI security architect discusses top threats to LLMs
Richard Harang, Nvidia’s principal AI and ML security architect, said two of the biggest pain points for LLMs right now are insecure plugins and indir… First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366599855/Nvidia-AI-security-architect-discusses-top-threats-to-LLMs
-
The Weaponization of AI and ML is Complicating the Digital Battlefield
Zero-trust architecture is increasingly seen as a solution to the challenges posed by AI and ML. Initial training must focus on standardizing basic te… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/the-weaponization-of-ai-and-ml-is-complicating-the-digital-battlefield/
-
Researchers Disclosed 20 Vulnerabilities Exploited To Attack ML Used In Orgs
The MLOps pipeline automates the machine learning lifecycle, from model training to deployment, which involves defining the pipeline using Python code… First seen on gbhackers.com Jump to article: gbhackers.com/20ml-vulnerabilities-exposed/
-
How to Maximize Network Security With AI and ML
First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/how-to-maximize-network-security-with-ai-and-ml/
-
Protect AI Raises $60 Million in Series B Funding
AI and ML security provider Protect AI has raised $60 million in a Series B funding round led by Evolution Equity Partners. The post Protect AI Raises… First seen on securityweek.com Jump to article: www.securityweek.com/protect-ai-raises-60-million-in-series-b-funding/
-
How U.S. Businesses can Fight the Deepfake Threat
While it’s unclear how new, advanced technologies like AI and ML will ultimately change the data security landscape, now is not the time to stand stil… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/how-u-s-businesses-can-fight-the-deepfake-threat/
-
Diversifying cyber teams to tackle complex threats
Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahor… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/10/diverse-cyber-workforce/
-
CVSS 10: Lücke in KI-Framework PyTorch gefährdet Netzwerke – ML-Framework PyTorch ermöglicht Cyberattacken
First seen on security-insider.de Jump to article: www.security-insider.de/kritische-luecke-pytorch-sicherheitstipps-updates-a-b036731dce3c4657d3070df45865f02e/
-
Balancing AI Performance and Safety: Lessons from PyData Berlin
Would you trust AI to call 911? GitGuardian’s ML engineer Nicolas posed this question at PyData Berlin, sparking a discussion on integrating ML into c… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/balancing-ai-performance-and-safety-lessons-from-pydata-berlin/
-
‘Sleepy Pickle’ Exploit Subtly Poisons ML Models
First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/sleepy-pickle-exploit-subtly-poisons-ml-models
-
Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users
Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or manip… First seen on gbhackers.com Jump to article: gbhackers.com/sleepy-pickle-exploit-ml-models/
-
Hackers Leverage AI as Application Security Threats Mount
Reverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying tre… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/hackers-leverage-ai-as-application-security-threats-mount/
-
OWASP Machine Learning Security Top 10 – Die zehn größten Bedrohungen für ML
Tags: mlFirst seen on security-insider.de Jump to article: www.security-insider.de/owasp-machine-learning-security-top-ten-praevention-tipps-a-a08c7daf6182210641732aea275fa2f5/
-
Watch: Behavior Doesn’t Lie: The Power of ML for Identity Threat Detection and Response
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizatio… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/watch-behavior-doesnt-lie-the-power-of-ml-for-identity-threat-detection-and-response/
-
Vulnerabilities for AI and ML Applications are Skyrocketing
In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code Execution indicates an… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/vulnerabilities-for-ai-and-ml-applications-are-skyrocketing/
-
Why MLBOMs Are Useful for Securing the AI/ML Supply Chain
A machine learning bill of materials (MLBOM) framework can bring transparency, auditability, control, and forensic insight into AI and ML supply chain… First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/mlboms-are-useful-for-securing-ai-ml-supply-chain
-
Beschleunigte Bereitstellung von ML-Apps – Sichere Workflows für Machine Learning Operations
Tags: mlFirst seen on security-insider.de Jump to article: www.security-insider.de/sichere-workflows-fuer-machine-learning-operations-a-76bc1a93b87d6efe4cc17617097559cd/
-
ML Model Repositories: The Next Big Supply Chain Attack Target
Machine-learning model platforms like Hugging Face are suspectible to the same kind of attacks that threat actors have executed successfully for years… First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/ml-model-repositories-next-big-supply-chain-attack-target
-
Malicious AI models on Hugging Face backdoor users’ machines
At least 100 instances of malicious AI ML models were found on the Hugging Face platform, some of which can execute code on the victim’s machine, givi… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/malicious-ai-models-on-hugging-face-backdoor-users-machines/
-
Künstliche Intelligenz und Machine Learning in der Cyberabwehr – Mit KI und ML den Angreifern einen Schritt voraus sein
First seen on security-insider.de Jump to article: www.security-insider.de/mit-ki-und-ml-den-angreifern-einen-schritt-voraus-sein-a-99095fcb57595b153173758289fc2d10/
-
ML-basierte XDR-Lösungen: Das Schweizer Messer der IT-Sicherheit
Mittels einer XDR-Plattform ist es möglich, Sicherheitsteams einen ganzheitlichen Überblick über Netzwerke, Cloud-Workloads und Server zu liefern. Hin… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ml-basierte-xdr-loesungen-das-schweizer-messer-der-it-sicherheit/a33432/
-
Palo Alto Networks stellt neue Zero Trust OT Security-Lösung vor
Mit der ML-basierten OT-Visibility-Engine erkennt der Industrial OT Security-Service Hunderte von einzigartigen OT-Geräteprofilen, über 1.000 OT/Indus… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/palo-alto-networks-stellt-neue-zero-trust-ot-security-loesung-vor/a33571/
-
JFrog und AWS beschleunigen die sichere Entwicklung von Machine Learning
Tags: mlZusammen mit seiner Amazon SageMaker-Integration hat JFrog neue Versionierungsfunktionen für seine ML-Modell-Management-Lösung vorgestellt. Diese inte… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/jfrog-und-aws-beschleunigen-die-sichere-entwicklung-von-machine-learning/a36317/

