Cybersecurity

Study: GPT-4 Agent Can Exploit Unpatched Vulnerabilities

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development Researchers Keep Prompts Under Wraps Rashmi Ramesh (rashmiramesh_) • April 22, 2024     Researchers said their GPT-4 agent performed exceptionally well at crafting exploits after being fed CVEs. (Image: Shutterstock) Academics at a U.S. university found that if you feed a GPT-4 artificial […]

Cybersecurity

Armis Buys Cyber Remediation Startup Silk Security for $150M

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development Combination of Armis and Silk Will Create Leader in Asset Management, Remediation Michael Novinson (MichaelNovinson) • April 17, 2024     Nadir Izrael, co-founder and chief technology officer, Armis (Image: Armis) Armis has purchased a security prioritization and remediation vendor led by a Goldman […]

Cybersecurity

Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned the CVE identifier CVE-2024-31497, with the […]

Cybersecurity

Hackers Can Use AI Hallucinations to Spread Malware

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development A Fake Software Library Made Up by a ChatBot Was Downloaded More Than 35,000 Times Rashmi Ramesh (rashmiramesh_) • April 5, 2024     Generative artificial intelligence can hallucinate its way into providing an opportunity for hackers. (Image: Shutterstock) Generative artificial intelligence is good […]

Cybersecurity

3 Things CISOs Achieve with Cato

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs around the globe use Cato SSE 360, as part of the Cato SASE Cloud platform to balance these factors without compromise. This article details how […]

Cybersecurity

DARPA Picks 7 Small Businesses for AI Cyber Challenge

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development Firms Get $1 Million Funding to Develop System to Automatically Fix AI Bugs Rashmi Ramesh (rashmiramesh_) • March 12, 2024     The Defense Advanced Research Projects Agency awarded seven small businesses contracts to develop a cyber reasoning system. (Image: Shutterstock) The United States […]

Cybersecurity

Cisco addressed severe flaws in its Secure Client

Cisco addressed severe flaws in its Secure Client Pierluigi Paganini March 08, 2024 Cisco addressed two high-severity vulnerabilities in Secure Client that could lead to code execution and unauthorized remote access VPN sessions. Cisco released security patches to address two high-severity vulnerabilities in Secure Client respectively tracked as CVE-2024-20337 and CVE-2024-20338. Cisco Secure Client is […]

Cybersecurity

Report Says Iranian Hackers Targeting Israeli Defense Sector

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development Hackers Are Leveraging Israel-Hamas War to Carry Out Attacks, Researcher Tells ISMG Chris Riotta (@chrisriotta) • February 27, 2024     Mandiant found suspected Iranian hackers targeting Middle Eastern defense workers. (Image: Shutterstock) Cybersecurity researchers identified a suspected Iranian espionage […]