Saturday, November 23, 2024

Artificial Intelligence

Face Check With Microsoft Entra Verified ID Is Now Generally Available, Microsoft

Microsoft announced that Face Check with Microsoft Entra Verified ID is now generally accessible.It is available standalone and as part of the Microsoft Entra Suite, a comprehensive identity...

Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection

Deep learning models analyzing API sequences for Windows malware detection face challenges due to evolving malware variants.A group of researchers recently proposed the MME...

Threat Actots Leveraging ChatGPT To Craft Sophisticated Attacks

Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys, NetSupport, CleanUpLoader, ModiLoader, LokiBot,...

Ollama AI Platform Flaw Let Attackers Execute Remote Code

⁤Hackers attack AI infrastructure platforms since these systems contain a multitude of valuable data, algorithms that are sophisticated in nature, and significant computational resources....

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or manipulate outcomes...

Microsoft Details AI Jailbreaks And How They Can Be Mitigated

Generative AI systems comprise several components and models geared to enhancing human interactions with the system. However, while being as realistic and useful as possible,...

SWARM – Switchable Backdoor Attack Against Pre-trained Models

In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance on downstream tasks. Visual prompting...

Hackers Moving To AI But Lacking Behind The Defenders In Adoption Rates

Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new ways to exploit other...

GoldDigger Malware Using Deep Fake AI Photos To Hijack Bank Accounts

Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to sensitive information or systems. Cybersecurity...

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake

Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain.These mistakes can include weak...

Chinese Hackers Using AI Tools To Influence Upcoming Elections

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used...