Artificial Intelligence

DeepSeek’s Malware-Generation Capabilities Put to Test

DeepSeek’s Malware-Generation Capabilities Put to Test 2025-03-13 at 15:01 By Eduard Kovacs Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this […]

React to this headline:

Loading spinner

DeepSeek’s Malware-Generation Capabilities Put to Test Read More »

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers 2025-03-12 at 16:41 By Stu Sjouwerman Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials. The post Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers Read More »

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks 2025-03-12 at 13:32 By SecurityWeek News How hyper agenda-driven threat actors, cybercriminals, and nation-states integrate digital, narrative, and physical attacks to target organizations through their executives. The post Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks appeared first on

React to this headline:

Loading spinner

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks Read More »

How to spot and avoid AI-generated scams

How to spot and avoid AI-generated scams 2025-03-11 at 18:02 By Help Net Security As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot. Phishing, deepfakes, and voice cloning are among the most common AI-driven techniques used by

React to this headline:

Loading spinner

How to spot and avoid AI-generated scams Read More »

Review: The Cybersecurity Trinity

Review: The Cybersecurity Trinity 2025-03-10 at 18:02 By Mirko Zorz The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates how they work together to enhance security effectiveness, offering a practical and

React to this headline:

Loading spinner

Review: The Cybersecurity Trinity Read More »

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance 2025-03-07 at 13:31 By Kevin Townsend Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities. The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared first on

React to this headline:

Loading spinner

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance Read More »

AI threats and workforce shortages put pressure on security leaders

AI threats and workforce shortages put pressure on security leaders 2025-03-07 at 07:30 By Help Net Security In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a shortage of cybersecurity skills. The survey

React to this headline:

Loading spinner

AI threats and workforce shortages put pressure on security leaders Read More »

AIceberg Gets $10 Million in Seed Funding for AI Security Platform

AIceberg Gets $10 Million in Seed Funding for AI Security Platform 2025-03-06 at 13:15 By Eduard Kovacs AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI.  The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

AIceberg Gets $10 Million in Seed Funding for AI Security Platform Read More »

89% of enterprise AI usage is invisible to the organization

89% of enterprise AI usage is invisible to the organization 2025-03-06 at 07:04 By Help Net Security Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of connections are

React to this headline:

Loading spinner

89% of enterprise AI usage is invisible to the organization Read More »

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing 

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  2025-03-05 at 13:02 By Ryan Naraine Knostic provides a “need-to-know” filter on the answers generated by enterprise large language models (LLM) tools. The post Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  Read More »

Scammers take over social media

Scammers take over social media 2025-03-05 at 07:02 By Help Net Security In Q4 2024, cyber threats reached unprecedented levels, with 2.55 billion attacks blocked, equating to 321 threats every second. In this Help Net Security video, Luis Corrons, Security Evangelist at Gen, discusses a new Gen report that highlights a troubling trend: social media

React to this headline:

Loading spinner

Scammers take over social media Read More »

Intel TDX Connect Bridges the CPU-GPU Security Gap

Intel TDX Connect Bridges the CPU-GPU Security Gap 2025-03-04 at 18:19 By Kevin Townsend AI is all about data – and keeping AI’s data confidential both within devices and between devices is problematic. Intel offers a solution. The post Intel TDX Connect Bridges the CPU-GPU Security Gap appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Intel TDX Connect Bridges the CPU-GPU Security Gap Read More »

AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape

AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape 2025-03-04 at 18:00 By Alastair Paterson Unauthorized AI usage is a ticking time bomb. A tool that wasn’t considered a risk yesterday may introduce new AI-powered features overnight. The post AI Asset Inventories: The Only Way to Stay on Top of

React to this headline:

Loading spinner

AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape Read More »

Prioritizing data and identity security in 2025

Prioritizing data and identity security in 2025 2025-03-04 at 17:02 By Help Net Security To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their fingertips than ever, and data breaches have become almost a daily occurrence. For both businesses

React to this headline:

Loading spinner

Prioritizing data and identity security in 2025 Read More »

Innovation vs. security: Managing shadow AI risks

Innovation vs. security: Managing shadow AI risks 2025-03-03 at 18:02 By Help Net Security In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which departments, unsatisfied with

React to this headline:

Loading spinner

Innovation vs. security: Managing shadow AI risks Read More »

Generative AI: Essential Insights for CISOs on Security Impacts

Generative AI: Essential Insights for CISOs on Security Impacts 2025-03-03 at 16:04 By Generative AI (GenAI) is transforming the cybersecurity landscape, requiring Chief Information Security Officers (CISOs) and their teams to adapt quickly to both opportunities and challenges, according to the Gartner® report 4 Ways Generative AI Will Impact CISOs and Their Teams[1]. This article is

React to this headline:

Loading spinner

Generative AI: Essential Insights for CISOs on Security Impacts Read More »

Review: The Chief AI Officer’s Handbook

Review: The Chief AI Officer’s Handbook 2025-03-03 at 07:33 By Mirko Zorz The Chief AI Officer’s Handbook is a comprehensive resource for professionals navigating AI implementation and strategy. It is particularly valuable for Chief AI Officers (CAIOs), offering guidance on defining their role and executing AI-driven business strategies. About the author Jarrod Anderson, SYRV’s Chief

React to this headline:

Loading spinner

Review: The Chief AI Officer’s Handbook Read More »

Microsoft Names Suspects in Lawsuit Against AI Hackers

Microsoft Names Suspects in Lawsuit Against AI Hackers 2025-02-28 at 12:49 By Eduard Kovacs In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam. The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Microsoft Names Suspects in Lawsuit Against AI Hackers Read More »

Understanding the AI Act and its compliance challenges

Understanding the AI Act and its compliance challenges 2025-02-28 at 08:03 By Mirko Zorz In this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity assessments and transparency requirements. Dumont

React to this headline:

Loading spinner

Understanding the AI Act and its compliance challenges Read More »

Is Agentic AI too smart for your own good?

Is Agentic AI too smart for your own good? 2025-02-27 at 08:02 By Mirko Zorz Agentic AI, which consists of systems that autonomously take action based on high-level goals, is becoming integral to enterprise security, threat intelligence, and automation. While these systems present significant potential, they also introduce new risks that CISOs must address. This

React to this headline:

Loading spinner

Is Agentic AI too smart for your own good? Read More »

Scroll to Top