AI hallucinations can pose a risk to your cybersecurity

In early 2023, Google’s Bard made headlines for a pretty big mistake, which we now call an AI hallucination. During a demo, the chatbot was asked, “What new discoveries from the James Webb Space Telescope can I tell my 9-year-old about?” Bard answered that JWST, which launched in December 2021, took the “very first pictures” […]

The post AI hallucinations can pose a risk to your cybersecurity appeared first on Security Intelligence.

Continue reading AI hallucinations can pose a risk to your cybersecurity

Best practices on securing your AI deployment

As organizations embrace generative AI, there are a host of benefits that they are expecting from these projects—from efficiency and productivity gains to improved speed of business to more innovation in products and services. However, one factor that forms a critical part of this AI innovation is trust. Trustworthy AI relies on understanding how the […]

The post Best practices on securing your AI deployment appeared first on Security Intelligence.

Continue reading Best practices on securing your AI deployment

How cyber criminals are compromising AI software supply chains

With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to […]

The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

Continue reading How cyber criminals are compromising AI software supply chains

Cost of a data breach: The industrial sector

Industrial organizations recently received a report card on their performance regarding data breach costs. And there’s plenty of room for improvement. According to the 2024 IBM Cost of a Data Breach (CODB) report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the […]

The post Cost of a data breach: The industrial sector appeared first on Security Intelligence.

Continue reading Cost of a data breach: The industrial sector

Generative AI security requires a solid framework

How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny. The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM […]

The post Generative AI security requires a solid framework appeared first on Security Intelligence.

Continue reading Generative AI security requires a solid framework

How I got started: AI security researcher

For the enterprise, there’s no escape from deploying AI in some form. Careers focused on AI are proliferating, but one you may not be familiar with is AI security researcher. These AI specialists are cybersecurity professionals who focus on the unique vulnerabilities and threats that arise from the use of AI and machine learning (ML) […]

The post How I got started: AI security researcher appeared first on Security Intelligence.

Continue reading How I got started: AI security researcher

Mapping attacks on generative AI to business impact

In recent months, we’ve seen government and business leaders put an increased focus on securing AI models. If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that technology is trusted and secure must be businesses’ top priority. While generative AI adoption is […]

The post Mapping attacks on generative AI to business impact appeared first on Security Intelligence.

Continue reading Mapping attacks on generative AI to business impact

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Continue reading ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023

Generative AI can be used by attackers, but security professionals shouldn’t lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why. Continue reading Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023