article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

In a thought-provoking interview on the Threat Vector podcast , Palo Alto Networks researchers Bar Matalon and Rem Dudas shed light on their groundbreaking research into AI-generated malware and shared their predictions for the future of AI in cybersecurity. We did that for different operating systems – for Windows, macOS and Linux.

Malware 85
article thumbnail

Top 5 Security Trends for CIOs

CIO

With every such change comes opportunity–for bad actors looking to game the system. Sometimes they simply don’t work, perhaps due to a change in contact lenses or a new tattoo. A second, more pernicious risk is the fact that ChatGPT can write malware. The malware itself is easy to buy on the Dark Web.

Trends 317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to manage cloud exploitation at the edge

CIO

Companies that have embraced the cloud need to understand the Shared Responsibility Model: a security and compliance framework that explains what shared infrastructure and systems the cloud provider is responsible for maintaining and how a customer is responsible for operating systems, data, and applications utilizing the cloud.

Cloud 246
article thumbnail

Adaware Review – Does Adaware Really Job?

Storm Consulting

Produced by cybersecurity corporation Lavasoft, adaware is definitely an antivirus security software program designed to fight off the types of malware that bog down your computer – courses that keep tabs on searching habits and lessons that hijack browser start pages and slam you with troublesome advertisements. some percent of threats.

article thumbnail

Foote Partners: bonus disparities reveal tech skills most in demand in Q3

CIO

Security, as ever, made a strong showing, with big premiums paid for experience in cryptography, penetration testing, risk analytics and assessment, and security testing. Other tools including Informatica, Keras, Splunk and Redis also made the list.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

Uncovering the domestic and foreign threats to critical infrastructure Critical infrastructure refers to the physical and virtual systems and assets so vital to our society that their incapacity or destruction would have a debilitating impact on security, national economic stability, public health, or safety.

article thumbnail

AI and automation will play an increasing role in technology

CIO

As Michael Dell predicts , “Building systems that are built for AI first is really inevitable.” This application has been in the news lately due to the quality and detail of its outputs. It’s also been flagged as a risk: cybersecurity companies have identified bad actors using ChatGPT to create malware. But how good can it be?