article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

In a thought-provoking interview on the Threat Vector podcast , Palo Alto Networks researchers Bar Matalon and Rem Dudas shed light on their groundbreaking research into AI-generated malware and shared their predictions for the future of AI in cybersecurity. We did that for different operating systems – for Windows, macOS and Linux.

Malware 84
article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. According to a Reuters report, these ransomware bandits also breached the systems of several other companies operating in manufacturing, retail, and technology. IBM Security pegged that same number higher, to 95%.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Security Trends for CIOs

CIO

With every such change comes opportunity–for bad actors looking to game the system. Sometimes they simply don’t work, perhaps due to a change in contact lenses or a new tattoo. A second, more pernicious risk is the fact that ChatGPT can write malware. The malware itself is easy to buy on the Dark Web.

Trends 290
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. As technology advances, so too does the sophistication of threats to these essential systems.

article thumbnail

Tenable OT Security: 2023 Year in Review

Tenable

That’s where OT security might start, but in order to devise an actionable cybersecurity strategy that effectively reduces cyber risk and protects operational uptime, organizations need full visibility into all elements of the attack surface.

article thumbnail

Improving visibility and security in hybrid cloud environments

CIO

It’s a reminder that without a clear view of our data and systems, we’re leaving ourselves vulnerable to all sorts of risks. And when it comes to incident response, a large percentage of organizations find it difficult to act swiftly due to limited visibility into cloud activities. That’s where centralized visibility comes in.

Cloud 240
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

Cyber hygiene best practices include device security , cyber security education , and secure networking strategies. Hackers take advantage of out-of-date systems, software, and known security issues. Customers can review reports on threats blocked via a special portal.

Wireless 237