Artificial Intelligence

Enterprises walk a tightrope between AI innovation and security

Enterprises walk a tightrope between AI innovation and security 2025-03-24 at 08:02 By Help Net Security AI/ML tool usage surged globally in 2024, with enterprises integrating AI into operations and employees embedding it in daily workflows, according to Zscaler. The report reveals a 3,000+% year-over-year growth in enterprise use of AI/ML tools, highlighting the rapid […]

React to this headline:

Loading spinner

Enterprises walk a tightrope between AI innovation and security Read More »

New Jailbreak Technique Uses Fictional World to Manipulate AI

New Jailbreak Technique Uses Fictional World to Manipulate AI 2025-03-21 at 14:16 By Ionut Arghire Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls. The post New Jailbreak Technique Uses Fictional World to Manipulate AI appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

New Jailbreak Technique Uses Fictional World to Manipulate AI Read More »

How AI and automation are reshaping security leadership

How AI and automation are reshaping security leadership 2025-03-18 at 16:02 By Help Net Security The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, the promise of security automation is coming to fruition. In theory and practice, security

React to this headline:

Loading spinner

How AI and automation are reshaping security leadership Read More »

ChatGPT Vulnerability Exploited Against US Government Organizations

ChatGPT Vulnerability Exploited Against US Government Organizations 2025-03-18 at 12:02 By Ionut Arghire A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

ChatGPT Vulnerability Exploited Against US Government Organizations Read More »

Hackers target AI and crypto as software supply chain risks grow

Hackers target AI and crypto as software supply chain risks grow 2025-03-18 at 07:47 By Help Net Security The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, according to a ReversingLabs report. According

React to this headline:

Loading spinner

Hackers target AI and crypto as software supply chain risks grow Read More »

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services 2025-03-17 at 13:16 By Eduard Kovacs Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services Read More »

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models 2025-03-14 at 14:18 By Kevin Townsend Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments. The post New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models

React to this headline:

Loading spinner

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models Read More »

New CCA Jailbreak Method Works Against Most AI Models

New CCA Jailbreak Method Works Against Most AI Models 2025-03-14 at 13:36 By Ionut Arghire Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems. The post New CCA Jailbreak Method Works Against Most AI Models appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

New CCA Jailbreak Method Works Against Most AI Models Read More »

Top 5 threats keeping CISOs up at night in 2025

Top 5 threats keeping CISOs up at night in 2025 2025-03-14 at 08:05 By Help Net Security Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness,

React to this headline:

Loading spinner

Top 5 threats keeping CISOs up at night in 2025 Read More »

DeepSeek’s Malware-Generation Capabilities Put to Test

DeepSeek’s Malware-Generation Capabilities Put to Test 2025-03-13 at 15:01 By Eduard Kovacs Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

DeepSeek’s Malware-Generation Capabilities Put to Test Read More »

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers 2025-03-12 at 16:41 By Stu Sjouwerman Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials. The post Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers Read More »

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks 2025-03-12 at 13:32 By SecurityWeek News How hyper agenda-driven threat actors, cybercriminals, and nation-states integrate digital, narrative, and physical attacks to target organizations through their executives. The post Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks appeared first on

React to this headline:

Loading spinner

Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks Read More »

How to spot and avoid AI-generated scams

How to spot and avoid AI-generated scams 2025-03-11 at 18:02 By Help Net Security As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot. Phishing, deepfakes, and voice cloning are among the most common AI-driven techniques used by

React to this headline:

Loading spinner

How to spot and avoid AI-generated scams Read More »

Review: The Cybersecurity Trinity

Review: The Cybersecurity Trinity 2025-03-10 at 18:02 By Mirko Zorz The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates how they work together to enhance security effectiveness, offering a practical and

React to this headline:

Loading spinner

Review: The Cybersecurity Trinity Read More »

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance 2025-03-07 at 13:31 By Kevin Townsend Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities. The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared first on

React to this headline:

Loading spinner

New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance Read More »

AI threats and workforce shortages put pressure on security leaders

AI threats and workforce shortages put pressure on security leaders 2025-03-07 at 07:30 By Help Net Security In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a shortage of cybersecurity skills. The survey

React to this headline:

Loading spinner

AI threats and workforce shortages put pressure on security leaders Read More »

AIceberg Gets $10 Million in Seed Funding for AI Security Platform

AIceberg Gets $10 Million in Seed Funding for AI Security Platform 2025-03-06 at 13:15 By Eduard Kovacs AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI.  The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

AIceberg Gets $10 Million in Seed Funding for AI Security Platform Read More »

89% of enterprise AI usage is invisible to the organization

89% of enterprise AI usage is invisible to the organization 2025-03-06 at 07:04 By Help Net Security Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of connections are

React to this headline:

Loading spinner

89% of enterprise AI usage is invisible to the organization Read More »

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing 

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  2025-03-05 at 13:02 By Ryan Naraine Knostic provides a “need-to-know” filter on the answers generated by enterprise large language models (LLM) tools. The post Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  Read More »

Scammers take over social media

Scammers take over social media 2025-03-05 at 07:02 By Help Net Security In Q4 2024, cyber threats reached unprecedented levels, with 2.55 billion attacks blocked, equating to 321 threats every second. In this Help Net Security video, Luis Corrons, Security Evangelist at Gen, discusses a new Gen report that highlights a troubling trend: social media

React to this headline:

Loading spinner

Scammers take over social media Read More »

Scroll to Top