ChatGPT maker OpenAI acknowledged that it would be "impossible" to develop generative artificial intelligence systems without using copyrighted material. The company defended its use of copyrighted material, stating that current copyright law does not forbid training data.
Alex Zeltcer, CEO and co-founder at nSure.ai, believes more companies are using AI and gen AI to create synthetic data that will be used to identify fraudulent groups who target online shoppers and gamers. He also observes social engineering at scale, perpetrated by machines, to conduct fraud.
In a solicitation for synthetic data generators, the U.S. federal government is looking for a machine that can generate fake data for real-world scenarios, such as identifying cybersecurity threats. Synthetic data can boost the accuracy of machine learning models or be used to test systems.
Machine learning systems are vulnerable to cyberattacks that could allow hackers to evade security and prompt data leaks, scientists at the National Institute of Standards and Technology warned. There is "no foolproof defense" against some of these attacks, researchers said.
In the wake of an apparently weak password being harvested by information-stealing malware and used to disrupt telecommunications giant Orange Spain's internet traffic, an expert is warning all organizations to beware of copycat attacks - and to lock down their internet registry accounts.
Ukraine's security intelligence chief said Russian hackers had been responsible for severing internet access and mobile communications from telecom operator Kyivstar in December, after compromising the firm's network months ago. He said the "disastrous" cyberattack had wiped "almost everything."
There are many potential uses for generative AI at financial services firms, but few are more promising than those in the areas of risk and fraud, said Kristine Demareski, vice president of payments at Genpact, which is already harnessing AI to increase efficiencies in analysts' decision-making.
Chase Cunningham discusses his new book, "How NOT to Lead: Lessons Every Manager Can Learn from Dumpster Chickens, Mushroom Farmers, and Other Office Offenders,” which details critical errors that can undermine your cybersecurity leadership and jeopardize your reputation and your company's future.
French IT firm Atos has confirmed it is in early-stage talks with Airbus to sell its cybersecurity unit for an estimated 1.8 billion euros, or 1.79 billion. The latest Airbus offer comes just six months after Airbus' unsuccessful bid for a minority stake in Atos Evidian.
Sharan Hiremath, senior product manager at JFrog, delved into the escalating challenge of supply chain attacks. With a focus on the surge in open-source vulnerabilities, he outlined key factors contributing to the rise of attacks and offered insights into threat mitigation strategies.
AI, machine learning and large language models are not new, but they are coming to fruition with the mass adoption of generative AI. For cybersecurity professionals, these are "exciting times we live in," said Dan Grosu, CTO and CISO at Information Security Media Group.
Domain name system or DNS attacks have persisted as a popular method for carrying out DDoS attacks. Haixin Duan, professor at Tsinghua University's Institute for Network Sciences and Cyberspace, describes TsuKing as a new form of DNS attack that does not require IP address spoofing.
Forrester analyst Sandy Carielli highlights key API security aspects in Forrester's report titled The Eight Components of API Security," which covers governance, discovery, testing, authentication and protection from API breaches as many organizations are grappling with the maturity of these areas.
Looking ahead to 2024, cybersecurity professionals and experts in artificial intelligence shared with ISMG their hopes for strong, responsible regulations and new partnerships with private sector stakeholders and international collaborators to keep pace with the evolving threat landscape.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.