ISC2 to launch AI educational workshops, bringing together industry experts and professionals to share practical solutions for addressing our top AI challenges| www.isc2.org
Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.| CSO Online
Data poisoning is a type of attack that involves tampering with and polluting a machine learning model's training data, impacting the model's ability to produce accurate predictions.| CSO Online
In a somewhat chilling revelation, AI agents were able to find and exploit known vulnerabilities, but only under certain conditions, which researchers say indicates they're not close to being a significant threat - yet.| CSO Online
Hugging Face has advised its community members to refresh access tokens or switch to safer ones to protect against the attack.| CSO Online
AI is simplifying all sorts of tasks — and not always for the better: cybercriminals, too, are adopting it.| CSO Online
Threat actors use phishing techniques to obtain non-public information about generative artificial intelligence.| CSO Online
As AI becomes integral to systems brought into the enterprise ecosystem it is increasingly critical for security teams to know where it is and reduce its risks.| CSO Online
Ray deployments are not intended to connect to the internet, but AI developers are doing so anyway and leaving their servers vulnerable.| CSO Online
Defensive AI emerged as a critical AI use, with 58% of respondents to a survey saying their organization is investing in AI to stop AI-based attacks.| CSO Online
Patched in the latest version of MLflow, the flaw allows attackers to steal or poison sensitive training data when a developer visits a random website on the internet.| CSO Online
Attackers have seen huge success using AI deepfakes for injection and presentation attacks – which means we’ll only see more of them. Advanced technology can help prevent (not just detect them).| CIO
Security information and event management software collects information to help identify and track cyber breaches. Here’s how to select the best SIEM product based on your company’s needs.| CSO Online
Is Hugging Face the target of model-based attacks? See a detailed explanation of the attack mechanism and what is required to identify real threats >| JFrog