News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

How ChatGPT will support cybercriminals
How ChatGPT will support cybercriminals

The OpenAI ChatGPT chatbot proves how artificial intelligence and machine learning can directly determine life and everyday life. Advanced IT users will use such tools for their purposes. And with that, unfortunately, cybercriminals too. OpenAI's ChatGPT AI model is based on unsupervised learning. With this ML approach, an AI model is fed with a large data set of unlabeled data. The vast corpus of material of books, articles and websites is based on pre-2021 sources and has no connections to the current internet. But that is already enough to learn the structures of natural language and to deceptively…

Read more

Is ChatGPT changing the future of IT security?
Is ChatGPT changing the future of IT security?

Open AI's ChatGPT software is making waves. With the help of AI, the chatbot answers a wide variety of questions very eloquently. So it should come as no surprise that, as is always the case with new technologies, criminals are already thinking about how to use these capabilities for their own ends. A joint study by Europol, Unicri and Trend Micro investigated this. According to these results, even better generated social engineering tools such as phishing or BEC could be considered for the Open AI software. Currently, other security researchers have also examined fraudulent emails generated with the currently hyped AI, and…

Read more

With AI and ChatGPT algorithm - hunt down cybercriminals
With AI and ChatGPT algorithm - hunt down cybercriminals

The further development of neural networks, AI and machine learning is becoming a real "game changer". The chatbot ChatGPT is currently making this more than clear. Sophos AI uses the advanced GPT technology to realize even better security applications. As the scale increases, neural networks get better and better. The basis for the program is the GPT-3.5 language processing model, which also comes from OpenAI. At supercomputing scale and in conjunction with machine learning, Sophos AI uses this advanced technology to realize even better security applications. Because especially in the area of ​​cyber security, the enormous performance stands out in contrast to…

Read more

Safety check for artificial intelligence in automobiles
B2B Cyber ​​Security ShortNews

Over the past twelve months, the Federal Office for Information Security (BSI) and the technology company ZF have been developing concepts and methods for testing the IT security of AI systems in motor vehicles in the joint AIMobilityAuditPrep project. Based on scientific findings and existing standards, 50 technically relevant requirements for AI systems were compiled, an expandable test environment for AI systems was developed and the basic feasibility and practical feasibility of the tests were demonstrated using selected use cases in a simulation. Safety checks for AI in the car With the follow-up project AIMobilityAudit, the practical implementation of safety checks for AI in automated…

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

Hardware-level cyber defense as a new solution
Hardware-level cyber defense as a new solution

When traditional security software alone is no longer sufficient, cyber defense must take place at the hardware level. Flexxon's X-PHY, a solid-state drive (SSD) with embedded artificial intelligence (AI), offers effective protection against cyber attacks. Security firmware and SSDs with an AI co-processor like the X-PHY can monitor cyber threats in real time, providing the last line of defense against cybercriminals. They use a machine learning algorithm that analyzes reading and writing data on the drive, along with other low-level memory commands. Thanks to its proximity to the data, the firmware ensures real-time detection of threats and…

Read more

AI in the SOC - the new measure of things
AI in SOC - the new measure of things

The SOC will also change massively through the use of AI. With an AI enhancement that distills the knowledge of a global "crowd" of SOC analysts from security workflows and then turns them into a kind of co-pilot. An assessment by Joshua Saxe, Chief Scientist and AI expert at Sophos. Today, there are two types of user-centric software products: products that use machine learning and automation to adapt to and achieve user goals, and products that are disruptive and require carefully memorized and repetitive interactions. Google Search, Siri and...

Read more

Network traffic: Analysis by AI and security experts
Network traffic: Analysis by AI and security experts

There are two types of cyberattacks: Automated opportunistic attempts to penetrate a network and targeted Advanced Persistent Threat (APT) attacks. The former are in the majority and artificial intelligence (AI) can automatically block most of them. But behind an APT there are often people. Defending against such network-level attacks requires both AI and security experts. The hackers show up first through the traces of their malware in the network. However, these anomalous traffic patterns are easily lost in the mass of information. Left to their own devices, the human IT manager is overwhelmed when...

Read more

Managed Service Providers as Trojan Horses
Managed Service Providers as Trojan Horses

Warnings to managed service providers to keep their IT protection up to date and to introduce new security guidelines are piling up. More recently, government regulators, including those in the UK and US, have reported an increase in malicious cyber activity explicitly targeting managed service providers. This is a development that will continue. A comment from Kay-Uwe-Wirtz, Regional Account Director Barracuda MSP. The reason for this is obvious, given that MSPs have direct access to their customers' networks and applications. Criminals who have successfully compromised an MSP using their infrastructure as a starting point are in the…

Read more

Solution for automatic DDoS attack mitigation
Solution for automatic DDoS attack mitigation

NETSCOUT announces a new solution for smarter and automated DDoS attack mitigation. An innovative approach uses global visibility and AI analytics to quickly respond to DDoS attacks and reduce operational overhead. NETSCOUT, a leading provider of cyber security, service assurance and business analytics solutions, announces the launch of a new Artificial Intelligence (AI) based solution. This allows customers to automatically and instantly block most DDoS attacks, simplifying operations and minimizing risk to their business. ATLAS Network with DDoS Monitor The solution leverages NETSCOUT's ATLAS network, an unmatched source for insight into DDOS attack activity...

Read more