article thumbnail

Article: Q&A on the Book Cybersecurity Threats, Malware Trends and Strategies

InfoQ Culture Methods

The book Cybersecurity Threats, Malware Trends and Strategies by Tim Rains provides a overview of the threat landscape over a twenty year period. It provides insights and solutions that can be used to develop an effective cybersecurity strategy and improve vulnerability management. By Ben Linders, Tim Rains.

Malware 115
article thumbnail

10 things to watch out for with open source gen AI

CIO

A model trained on, say, an archive of flat earth conspiracy theories will be bad at answering science questions, or a model fine-tuned by North Korean hackers might be bad at correctly identifying malware. They’re also full of inaccurate and biased information, malware, and other materials that can degrade the quality of output.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Counter AI Attacks with AI Defense

Palo Alto Networks

For example, they repurpose malware and often use off-the-shelf toolkits like CobaltStrike and Brute Ratel C4 to exploit weaknesses and take malicious actions with minimal effort. Develop Malicious Code – Threat actors can use AI tools to create malware and other code, even if they don’t have coding skills.

article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. They will discuss building a culture of security and how to focus board members to have the right conversations.

Malware 130
article thumbnail

Leaky Apps – How Banning Them Builds App Security

Ivanti

And these threats have increased in recent years: According to the 2023 State of Malware Report from Malwarebytes, 71% of companies worldwide were affected by ransomware. Think of this as malware targeting your systems, not your users. The United Nations Office on Drugs and Crime (UNODC) reported that more than 3.2

article thumbnail

Improving visibility and security in hybrid cloud environments

CIO

It’s about fostering a DevSecOps culture that brings together development, operations, and security teams to collaborate seamlessly. To truly enhance our security posture, we need to build security into the very fabric of our application development process. But it doesn’t stop there.

Cloud 246
article thumbnail

A Disturbing Trend in Ransomware Attacks: Legitimate Software Abuse

CIO

Go beyond malware detection: Since bad actors are often leveraging legitimate software, it’s important that organizations use a security solution that can detect and analyze suspicious behavior — and stop it. Vigilance within an organization is also key.

Software 130