AI
PortSwigger Launches Burp AI to Enhance Penetration Testing with AI
PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the field of cybersecurity with the launch of Burp AI, a groundbreaking set of artificial intelligence (AI)...
Artificial Intelligence
FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December
FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving.The analysis reveals that...
Artificial Intelligence
The Defender vs. The Attacker Game
The researcher proposes a game-theoretic approach to analyze the interaction between the model defender and attacker in trigger-based black-box model watermarking. They design payoff functions...
Artificial Intelligence
Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks
The Federal Bureau of Investigation (FBI) has issued a warning about a growing trend in cybercrime, hackers leveraging generative artificial intelligence (AI) to develop...
Artificial Intelligence
PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts
Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated learning (FL) to improve the efficiency and privacy of training...
Artificial Intelligence
Face Check With Microsoft Entra Verified ID Is Now Generally Available, Microsoft
Microsoft announced that Face Check with Microsoft Entra Verified ID is now generally accessible.It is available standalone and as part of the Microsoft...
Artificial Intelligence
Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection
Deep learning models analyzing API sequences for Windows malware detection face challenges due to evolving malware variants.A group of researchers recently proposed the MME...
Artificial Intelligence
Threat Actots Leveraging ChatGPT To Craft Sophisticated Attacks
Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys, NetSupport, CleanUpLoader, ModiLoader, LokiBot,...
Artificial Intelligence
Ollama AI Platform Flaw Let Attackers Execute Remote Code
Hackers attack AI infrastructure platforms since these systems contain a multitude of valuable data, algorithms that are sophisticated in nature, and significant computational resources....
Artificial Intelligence
Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users
Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or manipulate outcomes...
Artificial Intelligence
Microsoft Details AI Jailbreaks And How They Can Be Mitigated
Generative AI systems comprise several components and models geared to enhancing human interactions with the system. However, while being as realistic and useful as possible,...