article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current threat landscape, how Palo Alto Networks protects itself and its customers, as well as implications for the future of cybersecurity. And there is a bit of a longer version for that answer.

Malware 82
article thumbnail

Top 5 Security Trends for CIOs

CIO

Explosive technology innovations. Generational shifts in technological expectations. Keeping up–and hopefully, staying ahead–presents new challenges. Sometimes they simply don’t work, perhaps due to a change in contact lenses or a new tattoo. A second, more pernicious risk is the fact that ChatGPT can write malware.

Trends 283
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

A new era of cybersecurity with AI: Predictions for 2024

CIO

On the other hand, adversaries can also leverage LLMs to make attacks more efficient, exploit additional vulnerabilities introduced by LLMs, and misuse of LLMs can create more cybersecurity issues such as unintentional data leakage due to the ubiquitous use of AI. They can also leverage LLMs to create brand-new malware.

article thumbnail

How the tech industry is responding to Russia’s invasion of Ukraine

TechCrunch

The attack began with cyberattacks that targeted Ukrainian government departments with floods of internet traffic and data-wiping malware, followed by a ground, sea and air incursion. Ukraine is home to the finest engineers, designers, and other tech professionals,” he added. “I GET IN TOUCH.

article thumbnail

AI's Offensive & Defensive Impacts

Palo Alto Networks

Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current threat landscape, how Palo Alto Networks protects itself and its customers, as well as implications for the future of cybersecurity. Sikorski explains: "They can build trust very quickly.

article thumbnail

5 Reasons Why Disaster Recovery Plans Fail

Kaseya

You diligently back up critical servers to your on-site appliance or to the cloud, but when an incident happens and you need it the most, the backup recovery fails. . In these environments, processing, data management, and presentation functions may be hosted on different machines that all need to communicate with one another perfectly.

article thumbnail

Technology Trends for 2024

O'Reilly Media - Ideas

While we like to talk about how fast technology moves, internet time, and all that, in reality the last major new idea in software architecture was microservices, which dates to roughly 2015. We’re skeptical about things like job displacement, at least in technology. This has been a strange year. What will those changes be?

Trends 119