How generative AI Is expanding the insider threat attack surface

As the adoption of generative AI (GenAI) soars, so too does the risk of insider threats. This puts even more pressure on businesses to rethink security and confidentiality policies. In just a few years, artificial intelligence (AI) has radically changed the world of work. 61% of knowledge workers now use GenAI tools — particularly OpenAI’s […]

The post How generative AI Is expanding the insider threat attack surface appeared first on Security Intelligence.

Continue reading How generative AI Is expanding the insider threat attack surface

DHS releases critical infrastructure priorities for next two years

The agency says AI and China are some of the biggest cyber threats to the nation’s most sensitive networks.

The post DHS releases critical infrastructure priorities for next two years appeared first on CyberScoop.

Continue reading DHS releases critical infrastructure priorities for next two years

Generative AI security requires a solid framework

How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny. The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM […]

The post Generative AI security requires a solid framework appeared first on Security Intelligence.

Continue reading Generative AI security requires a solid framework

CISA leads first tabletop exercise for AI cybersecurity

The Biden administration-led exercise featured 15 companies and several international cyber agencies.

The post CISA leads first tabletop exercise for AI cybersecurity appeared first on CyberScoop.

Continue reading CISA leads first tabletop exercise for AI cybersecurity

Self-replicating Morris II worm targets AI email assistants

The proliferation of generative artificial intelligence (GenAI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals. Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in GenAI systems to orchestrate sophisticated cyberattacks with far-reaching […]

The post Self-replicating Morris II worm targets AI email assistants appeared first on Security Intelligence.

Continue reading Self-replicating Morris II worm targets AI email assistants

Microsoft’s Recall puts the Biden administration’s cyber credibility on the line

Why has the White House remained silent on the launch of a product that violates the spirit and letter of its flagship cybersecurity initiatives?

The post Microsoft’s Recall puts the Biden administration’s cyber credibility on the line appeared first on CyberScoop.

Continue reading Microsoft’s Recall puts the Biden administration’s cyber credibility on the line

Open source, open risks: The growing dangers of unregulated generative AI

While mainstream generative AI models have built-in safety barriers, open-source alternatives have no such restrictions. Here’s what that means for cyber crime. There’s little doubt that open-source is the future of software. According to the 2024 State of Open Source Report, over two-thirds of businesses increased their use of open-source software in the last year. […]

The post Open source, open risks: The growing dangers of unregulated generative AI appeared first on Security Intelligence.

Continue reading Open source, open risks: The growing dangers of unregulated generative AI

AI-driven compliance: The key to cloud security

The growth of cloud computing continues unabated, but it has also created security challenges. The acceleration of cloud adoption has created greater complexity, with limited cloud technical expertise available in the market, an explosion in connected and Internet of Things (IoT) devices and a growing need for multi-cloud environments. When clients migrate to the cloud, […]

The post AI-driven compliance: The key to cloud security appeared first on Security Intelligence.

Continue reading AI-driven compliance: The key to cloud security

New Hampshire authorities charge Democratic operative behind Biden AI robocall

Steve Kramer has been indicted for 13 counts of felony voter suppression and 13 misdemeanor counts of impersonating a political candidate. 

The post New Hampshire authorities charge Democratic operative behind Biden AI robocall appeared first on CyberScoop.

Continue reading New Hampshire authorities charge Democratic operative behind Biden AI robocall