HackDig : Dig high-quality web security articles for hackers

7 Cybersecurity Tools On Our Holiday Wish List

The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing in their heads. Instead, they dream of cybersecurity tools and other resources to help them cope with a wild threat landscape.  Here’s our ultimate holiday wish list. 
Publish At:2020-12-22 18:11 | Read:241 | Comments:0 | Tags:Application Security Artificial Intelligence Cloud Security

Deep learning: An explanation and a peek into the future

Deep learning is one of the most advanced forms of machine learning, and is showing new developments in many industries. In this article, we’ll explain the concept and give some examples of the latest and greatest ways it’s being used. What is deep learning? There have been many attempts at creating a definition of deep learning. As we&#
Publish At:2020-12-01 13:54 | Read:195 | Comments:0 | Tags:Explained analysis artificial intelligence automation big da

How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling

Words for health and the human body often make their way into the language we use to describe IT. Computers get viruses; companies manage their security hygiene; incident response teams train on their cyber fitness. Framing IT concepts in terms of health can also be useful when looking at security operations centers (SOCs) and jobs in cybersecurity. For man
Publish At:2020-11-16 14:15 | Read:283 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Cyberse

The face of tomorrow’s cybercrime: Deepfake ransomware explained

While many countries are beginning to ease up on their respective pandemic lock downs—which, in turn, also means that everyone will soon ease into a life that is not quite post-COVID-19—we find ourselves once more on the cusp of change, an outlook that makes some feel anxious and others hopeful. But for forward-looking security experts, there are some fut
Publish At:2020-06-26 14:20 | Read:755 | Comments:0 | Tags:Ransomware AI artificial intelligence backup cybercrime-wait

A zero-day guide for 2020: Recent attacks and advanced preventive techniques

Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.  This article examines three recent zero-day atta
Publish At:2020-06-23 14:30 | Read:674 | Comments:0 | Tags:Exploits and vulnerabilities artificial intelligence EDR end

A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast,
Publish At:2020-06-23 11:55 | Read:586 | Comments:0 | Tags:Artificial Intelligence Security Intelligence & Analytics Th

Facial recognition: tech giants take a step back

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law enforcement. These companies are concerned about the way in which their technology might be used. What happens when software that threatens our privacy falls into the hands of organization which we no longer trust? In general, being awar
Publish At:2020-06-18 13:50 | Read:871 | Comments:0 | Tags:Artificial Intelligence Privacy ACLU AI amazon biometrics EF

We Need the Security Benefits of AI and Machine Learning Now More Than Ever

Reading Time: ~ 3 min. As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem for business owners and MSPs is that cybercriminals are not reducing their budgets apace. On the contrary, the rise in COVID-related scams has been noticeable. It’s simply no time to cut corners in
Publish At:2020-06-16 15:50 | Read:642 | Comments:0 | Tags:Managed Service Providers artificial intelligence machine le

How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
Publish At:2020-05-24 06:18 | Read:772 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ac

Measuring the Effectiveness of AI in the SOC

In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Publish At:2020-05-24 06:18 | Read:806 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Busines

AI and ML in Cybersecurity: Adoption is Rising, but Confusion Remains

Reading Time: ~ 3 min. If you’ve been working in the technology space for any length of time, you’ve undoubtedly heard about the rising importance of artificial intelligence (AI) and machine learning (ML). But what can these tools really do for you? More specifically, what kinds of benefits do they offer for cybersecurity and business operations? If you’r
Publish At:2020-05-18 13:03 | Read:735 | Comments:0 | Tags:SMBs artificial intelligence machine learning

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of
Publish At:2020-03-27 09:35 | Read:993 | Comments:0 | Tags:Artificial Intelligence Advanced Threats Artificial Intellig

Clearview AI loses entire database of faceprint-buying clients to hackers

byLisa VaasClearview AI, the controversial facial recognition startup that’s gobbled up more than three billion of our photos by scraping social media sites and any other publicly accessible nook and cranny it can find, has lost its entire list of clients to hackers – including details about its many law enforcement clients.In a notification that
Publish At:2020-02-28 09:16 | Read:1395 | Comments:0 | Tags:Data loss Law & order Privacy Security threats AI Artificial

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information Artificial intelligence (AI) is an immensely helpful tool for businesses and consumers alike. By processing data quickly and predicting analytics, AI can do everything from automating systems to prote
Publish At:2020-02-19 11:40 | Read:1131 | Comments:0 | Tags:Breaking News Security AI Artificial Intelligence hacking ne

Self-driving car dataset missing labels for pedestrians, cyclists

byLisa VaasA popular self-driving car dataset for training machine-learning systems – one that’s used by thousands of students to build an open-source self-driving car – contains critical errors and omissions, including missing labels for hundreds of images of bicyclists and pedestrians.Machine learning models are only as good as the data o
Publish At:2020-02-15 12:43 | Read:971 | Comments:0 | Tags:Machine Learning AI Artificial intelligence Autonomous vehic

Tools

Tag Cloud