How are state-sponsored threat actors leveraging AI?

Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations. Threat actors use LLMs for various tasks Just as defenders do, threat actors are leveraging A… Continue reading How are state-sponsored threat actors leveraging AI?

State-backed hackers are experimenting with OpenAI models 

Microsoft and OpenAI say hackers from China, Iran, North Korea and Russia are exploring the use of large language models in their operations. 

The post State-backed hackers are experimenting with OpenAI models  appeared first on CyberScoop.

Continue reading State-backed hackers are experimenting with OpenAI models 

Volt Typhoon targeted emergency management services, per report

Dragos researchers found that the China-sponsored hacking group has been attacking electric utilities since 2023.

The post Volt Typhoon targeted emergency management services, per report appeared first on CyberScoop.

Continue reading Volt Typhoon targeted emergency management services, per report

Protecting against AI-enhanced email threats

Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals. Its ability to process large amounts of data and quickly generate results has contributed to its widespread adoption… Continue reading Protecting against AI-enhanced email threats

Protecting against AI-enhanced email threats

Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals. Its ability to process large amounts of data and quickly generate results has contributed to its widespread adoption… Continue reading Protecting against AI-enhanced email threats

Feds: Chinese hacking operations have been in critical infrastructure networks for five years

FBI, NSA and CISA officials warn that Volt Typhoon actors are “pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions.”

The post Feds: Chinese hacking operations have been in critical infrastructure networks for five years appeared first on CyberScoop.

Continue reading Feds: Chinese hacking operations have been in critical infrastructure networks for five years

Common cloud security mistakes and how to avoid them

According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud security professionals are not sure their security protections and their team would … Continue reading Common cloud security mistakes and how to avoid them

New Hampshire authorities trace Biden AI robocall to Texas-based telecom

An investigation identified Life Corporation and Lingo Telecom as allegedly behind the operation that impersonated President Joe Biden. 

The post New Hampshire authorities trace Biden AI robocall to Texas-based telecom appeared first on CyberScoop.

Continue reading New Hampshire authorities trace Biden AI robocall to Texas-based telecom

Deepfakes, dollars and ‘deep state’ fears: Inside the minds of election officials heading into 2024

State and local officials say they need more funding and resources to deal with a deluge of threats ranging from AI to threats of personal violence.

The post Deepfakes, dollars and ‘deep state’ fears: Inside the minds of election officials heading into 2024 appeared first on CyberScoop.

Continue reading Deepfakes, dollars and ‘deep state’ fears: Inside the minds of election officials heading into 2024