HackDig : Dig high-quality web security articles for hackers

The face of tomorrow’s cybercrime: Deepfake ransomware explained

While many countries are beginning to ease up on their respective pandemic lock downs—which, in turn, also means that everyone will soon ease into a life that is not quite post-COVID-19—we find ourselves once more on the cusp of change, an outlook that makes some feel anxious and others hopeful. But for forward-looking security experts, there are some fut
Publish At:2020-06-26 14:20 | Read:124 | Comments:0 | Tags:Ransomware AI artificial intelligence backup cybercrime-wait

A zero-day guide for 2020: Recent attacks and advanced preventive techniques

Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.  This article examines three recent zero-day atta
Publish At:2020-06-23 14:30 | Read:68 | Comments:0 | Tags:Exploits and vulnerabilities artificial intelligence EDR end

A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast,
Publish At:2020-06-23 11:55 | Read:98 | Comments:0 | Tags:Artificial Intelligence Security Intelligence & Analytics Th

Facial recognition: tech giants take a step back

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law enforcement. These companies are concerned about the way in which their technology might be used. What happens when software that threatens our privacy falls into the hands of organization which we no longer trust? In general, being awar
Publish At:2020-06-18 13:50 | Read:180 | Comments:0 | Tags:Artificial Intelligence Privacy ACLU AI amazon biometrics EF

We Need the Security Benefits of AI and Machine Learning Now More Than Ever

Reading Time: ~ 3 min. As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem for business owners and MSPs is that cybercriminals are not reducing their budgets apace. On the contrary, the rise in COVID-related scams has been noticeable. It’s simply no time to cut corners in
Publish At:2020-06-16 15:50 | Read:151 | Comments:0 | Tags:Managed Service Providers artificial intelligence machine le

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:160 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

Measuring the Effectiveness of AI in the SOC

In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Publish At:2020-05-24 06:18 | Read:301 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Busines

AI and ML in Cybersecurity: Adoption is Rising, but Confusion Remains

Reading Time: ~ 3 min. If you’ve been working in the technology space for any length of time, you’ve undoubtedly heard about the rising importance of artificial intelligence (AI) and machine learning (ML). But what can these tools really do for you? More specifically, what kinds of benefits do they offer for cybersecurity and business operations? If you’r
Publish At:2020-05-18 13:03 | Read:143 | Comments:0 | Tags:SMBs artificial intelligence machine learning

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of
Publish At:2020-03-27 09:35 | Read:474 | Comments:0 | Tags:Artificial Intelligence Advanced Threats Artificial Intellig

Clearview AI loses entire database of faceprint-buying clients to hackers

byLisa VaasClearview AI, the controversial facial recognition startup that’s gobbled up more than three billion of our photos by scraping social media sites and any other publicly accessible nook and cranny it can find, has lost its entire list of clients to hackers – including details about its many law enforcement clients.In a notification that
Publish At:2020-02-28 09:16 | Read:585 | Comments:0 | Tags:Data loss Law & order Privacy Security threats AI Artificial

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information Artificial intelligence (AI) is an immensely helpful tool for businesses and consumers alike. By processing data quickly and predicting analytics, AI can do everything from automating systems to prote
Publish At:2020-02-19 11:40 | Read:492 | Comments:0 | Tags:Breaking News Security AI Artificial Intelligence hacking ne

Self-driving car dataset missing labels for pedestrians, cyclists

byLisa VaasA popular self-driving car dataset for training machine-learning systems – one that’s used by thousands of students to build an open-source self-driving car – contains critical errors and omissions, including missing labels for hundreds of images of bicyclists and pedestrians.Machine learning models are only as good as the data o
Publish At:2020-02-15 12:43 | Read:494 | Comments:0 | Tags:Machine Learning AI Artificial intelligence Autonomous vehic

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:611 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

How Deepfakes Will Make Us Question Everything in 2020

We’ve written about deepfakes before, but there’s one overlooked side effect that must be brought to our attention: As the technology improves and becomes more commonplace, what’s stopping anyone from claiming that what they definitively said was the result of a deepfake? While watching a recent episode of The New York Times’ “T
Publish At:2020-02-09 10:30 | Read:427 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ad

Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly evolving. Security measures that worked in the past will not be effective today, and today’s security controls will not be effective tomorrow. Many factors contribute to this rapid pace of change. A
Publish At:2020-02-09 10:30 | Read:639 | Comments:0 | Tags:Artificial Intelligence Analysts Artificial Intelligence (AI

Announce

Share high-quality web security related articles with you:)

Tools