News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Mobile phishing against company employees
Mobile phishing against company employees

Stolen employee credentials are one of the most effective ways for attackers to infiltrate a company's infrastructure. In 2022, the number of mobile phishing attacks was higher than ever. Once they have the credentials of any of the accounts in hand, it is much easier for them to bypass the security measures and gain access to sensitive data. But how do the attackers get these credentials? In many cases, the answer is mobile phishing. A global study by Lookout, The Global State of Mobile Phishing Report, found that the number of…

Read more

AI Report: Dreamteam ChatGPT and Cybersecurity
AI Report: Dreamteam ChatGPT and Cybersecurity

The ChatGPT AI model can more easily filter malicious activity in XDR telemetry, improve spam filters, and simplify analysis of "Living Off the Land Binaries" -- "LOLBins" for short. Sophos has recently published this in a new report. The topic is the GPT-3 language model, which is behind the well-known ChatGPT framework, and how the cybersecurity industry can use the model to defend against attackers. The current report "GPT for You and Me: Applying AI Language Processing to Cyber ​​Defenses" describes projects developed by Sophos X-Ops that use the extensive language models of GPT-3. The goal is…

Read more

AI controls Microsoft Security Copilot for cyber defense
AI controls Microsoft Security Copilot for cyber defense

Microsoft has introduced the integration of the AI-supported service in the field of cybersecurity. Trained in security and network disciplines, Microsoft Security Copilot is armed with trillions of data signals. This should give SOCs and cyber defense systems a head start in terms of speed and effectiveness. Microsoft Security Copilot gives security professionals an easy-to-use AI wizard to quickly identify and respond to threats. He combines Microsoft's extensive threat data with industry-leading expertise to better understand the overall threat landscape. Security Copilot helps admins monitor what's going on around them...

Read more

IT security & AI-based tools
B2B Cyber ​​Security ShortNews

While AI offers new opportunities for efficiency, creativity and personalization of phishing lures, it is important to remember that IT security is poorly adapted to such attacks. It's a good opportunity to update the training programs to educate employees on the new technologies and trends in phishing/smishing/vishing tactics and encourage them to be more vigilant. We may see an increase in highly individual and persuasive baits on a large scale. It is now much easier and faster for cybercriminals to hire an AI to compose a message that will send a…

Read more

How ChatGPT will support cybercriminals
How ChatGPT will support cybercriminals

The OpenAI ChatGPT chatbot proves how artificial intelligence and machine learning can directly determine life and everyday life. Advanced IT users will use such tools for their purposes. And with that, unfortunately, cybercriminals too. OpenAI's ChatGPT AI model is based on unsupervised learning. With this ML approach, an AI model is fed with a large data set of unlabeled data. The vast corpus of material of books, articles and websites is based on pre-2021 sources and has no connections to the current internet. But that is already enough to learn the structures of natural language and to deceptively…

Read more

Is ChatGPT changing the future of IT security?
Is ChatGPT changing the future of IT security?

Open AI's ChatGPT software is making waves. With the help of AI, the chatbot answers a wide variety of questions very eloquently. So it should come as no surprise that, as is always the case with new technologies, criminals are already thinking about how to use these capabilities for their own ends. A joint study by Europol, Unicri and Trend Micro investigated this. According to these results, even better generated social engineering tools such as phishing or BEC could be considered for the Open AI software. Currently, other security researchers have also examined fraudulent emails generated with the currently hyped AI, and…

Read more

With AI and ChatGPT algorithm - hunt down cybercriminals
With AI and ChatGPT algorithm - hunt down cybercriminals

The further development of neural networks, AI and machine learning is becoming a real "game changer". The chatbot ChatGPT is currently making this more than clear. Sophos AI uses the advanced GPT technology to realize even better security applications. As the scale increases, neural networks get better and better. The basis for the program is the GPT-3.5 language processing model, which also comes from OpenAI. At supercomputing scale and in conjunction with machine learning, Sophos AI uses this advanced technology to realize even better security applications. Because especially in the area of ​​cyber security, the enormous performance stands out in contrast to…

Read more

Safety check for artificial intelligence in automobiles
B2B Cyber ​​Security ShortNews

Over the past twelve months, the Federal Office for Information Security (BSI) and the technology company ZF have been developing concepts and methods for testing the IT security of AI systems in motor vehicles in the joint AIMobilityAuditPrep project. Based on scientific findings and existing standards, 50 technically relevant requirements for AI systems were compiled, an expandable test environment for AI systems was developed and the basic feasibility and practical feasibility of the tests were demonstrated using selected use cases in a simulation. Safety checks for AI in the car With the follow-up project AIMobilityAudit, the practical implementation of safety checks for AI in automated…

Read more

Quantum Titan: AI-powered cloud network security
Quantum Titan: AI-powered cloud network security

Check Point Quantum Titan, the new version of Check Point's cybersecurity platform, brings new aspects to IoT security and threat prevention. Release R81.20 brings faster, AI-powered network security and advanced threat prevention for on-premises, cloud, and IoT. Check Point Quantum Titan uses innovative artificial intelligence and deep learning technology to protect against the most sophisticated attacks, including zero-day phishing and domain name system exploits. The Quantum Titan security console introduces three new software blades that leverage artificial intelligence (AI) and deep learning to deliver advanced threat defenses against equally advanced...

Read more

Hardware-level cyber defense as a new solution
Hardware-level cyber defense as a new solution

When traditional security software alone is no longer sufficient, cyber defense must take place at the hardware level. Flexxon's X-PHY, a solid-state drive (SSD) with embedded artificial intelligence (AI), offers effective protection against cyber attacks. Security firmware and SSDs with an AI co-processor like the X-PHY can monitor cyber threats in real time, providing the last line of defense against cybercriminals. They use a machine learning algorithm that analyzes reading and writing data on the drive, along with other low-level memory commands. Thanks to its proximity to the data, the firmware ensures real-time detection of threats and…

Read more