article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. We did that for different operating systems – for Windows, macOS and Linux. That was the first stage I'd say.”

Malware 83
article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. Caesars noted in a filing that an “unauthorized actor” had stolen data in a social engineering attack targeting an outsourced IT support vendor, according to an InfoSecurity report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Copilot: an indispensable tool for banking security teams

CIO

System perimeters are more dispersed, with each remote worker providing a potential penetration point for a bad actor and enabling errant employees to cause problems from inside company defences. These can be via social engineering, known as ‘hacking the human’, or via unsecured technology like apps, data and networks.

Security 235
article thumbnail

The changing face of cybersecurity threats in 2023

CIO

government and the companies that are best prepared to provide safe-by-default solutions to uplift the whole ecosystem,” says a report published by the Homeland Security Department’s Cyber Safety Review Board. “Organizations must act now to protect themselves, and the Board identified tangible ways to do so, with the help of the U.S.

article thumbnail

A new era of cybersecurity with AI: Predictions for 2024

CIO

On the other hand, adversaries can also leverage LLMs to make attacks more efficient, exploit additional vulnerabilities introduced by LLMs, and misuse of LLMs can create more cybersecurity issues such as unintentional data leakage due to the ubiquitous use of AI. Deployment of LLMs requires a new way of thinking about cybersecurity.

article thumbnail

Top 5 Security Trends for CIOs

CIO

With every such change comes opportunity–for bad actors looking to game the system. Sometimes they simply don’t work, perhaps due to a change in contact lenses or a new tattoo. A second, more pernicious risk is the fact that ChatGPT can write malware. The malware itself is easy to buy on the Dark Web.

Trends 296
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

Uncovering the domestic and foreign threats to critical infrastructure Critical infrastructure refers to the physical and virtual systems and assets so vital to our society that their incapacity or destruction would have a debilitating impact on security, national economic stability, public health, or safety.