Artificial Intelligence
Hackers Moving To AI But Lacking Behind The Defenders In Adoption Rates
Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new ways to exploit other...
Artificial Intelligence
GoldDigger Malware Using Deep Fake AI Photos To Hijack Bank Accounts
Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to sensitive information or systems. Cybersecurity...
Artificial Intelligence
Top Israeli Spy Chief Identity Exposed In A Privacy Mistake
Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain.These mistakes can include weak...
Artificial Intelligence
Chinese Hackers Using AI Tools To Influence Upcoming Elections
By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used...
Artificial Intelligence
AI-As-A-Service Providers Vulnerability Let Attackers Perform Cross-Tenant Attacks
The fast acceptance of AI has serious security issues, as this necessitates strict security measures to be put in place for the protection of...
Artificial Intelligence
Researchers Propose An Invisible Backdoor Attack Dubbed DEBA
As deep neural networks (DNNs) become more prevalent, concerns over their security against backdoor attacks that implant hidden malicious functionalities have grown. Cybersecurity researchers (Wenmin...
Artificial Intelligence
Researchers Hacked AI Assistants Using ASCII Art
Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts conveyed through ASCII art. ASCII art is a form of visual...
Artificial Intelligence
Critical ChatGPT Plugins Flaw Let Attackers Gain Control Over Organization’s Account
Threat actors can exploit ChatGPT's ecosystem for several illicit purposes, such as crafting prompts to generate malicious code, phishing lures, and disinformation content.Even threat...