Fri.Apr 05, 2024

article thumbnail

Hackers Can Use AI Hallucinations to Spread Malware

Data Breach Today

A Fake Software Library Made Up by a ChatBot Was Downloaded More Than 35,000 Times Generative artificial intelligence is good at sounding authoritative - even when it's making stuff up. One community that thinks so-called AI hallucinations are actually a good thing: hackers. Especially when developers use AI tools that hallucinate entire software libraries.

article thumbnail

Magento flaw exploited to deploy persistent backdoor hidden in XML

Security Affairs

Threat actors are exploiting critical Magento vulnerability CVE-2024-20720 to install a persistent backdoor on e-stores. Sansec researchers observed threat actors are exploiting the recently disclosed Magento vulnerability CVE-2024-20720 to deploy a persistent backdoor on e-stores. The vulnerability CVE-2024-20720 (CVSS score of 9.1) is an OS Command (‘OS Command Injection’) vulnerability that could lead to arbitrary code execution.

CMS 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sophisticated Latrodectus Malware Linked to 2017 Strain

Data Breach Today

New Malware With Ties to IcedID Loader Evades Detection, Gains Persistence Security researchers are warning about a relatively new malware called Latrodectus, believed to be an evolutionary successor to the IcedID loader. It has been detected in malicious email campaigns since November 2023, and recent enhancements make it harder to detect and mitigate.

Security 307
article thumbnail

Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed

Schneier on Security

It seems that the FCC might be fixing the vulnerabilities in SS7 and the Diameter protocol: On March 27 the commission asked telecommunications providers to weigh in and detail what they are doing to prevent SS7 and Diameter vulnerabilities from being misused to track consumers’ locations. The FCC has also asked carriers to detail any exploits of the protocols since 2018.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Cloudflare Enters Observability Space With Baselime Purchase

Data Breach Today

Acquiring Baselime Will Give Developers Better Visibility Into Serverless Platforms Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.

302
302

More Trending

article thumbnail

Vietnamese Threat Actor Targeting Financial Data Across Asia

Data Breach Today

CoralRaider Looks for Social Media Accounts That Contain Payment Information Vietnamese financially motivated hackers are targeting businesses across Asia in a campaign to harvest corporate credentials and financial data for resale in online criminal markets. Researchers at Cisco Talos identified a cluster of hacking activity its tracks as CoralRaider.

Marketing 284
article thumbnail

Cyberattack disrupted services at Omni Hotels & Resorts

Security Affairs

US hotel chain Omni Hotels & Resorts suffered a cyber attack that forced the company to shut down its systems. A cyberattack hit Omni Hotels & Resorts disrupting its services and forcing the company to shut down its systems. Since Friday, March 29, Omni Hotels & Resorts has been responding to a cyberattack on its systems. Upon learning of this issue, Omni immediately took steps to shut down its systems to protect and contain its data.

Paper 92
article thumbnail

China Is Using AI to Influence Elections, Microsoft Warns

Data Breach Today

Chance of AI-Generated Content Affecting Results Appears to Remain Low - for Now China-backed attackers are continuing to refine their use of content generated using artificial intelligence tools, including audio deepfakes and video news anchors, to sow disruption and influence elections in the U.S., Taiwan, India and beyond, security researchers at Microsoft warn.

article thumbnail

How Pick n Pay plans to transform software test cases with AI

OpenText Information Management

Headquartered in Cape Town, South Africa, Pick n Pay is a leading retailer that operates more than 1,650 stores in seven countries on the African continent. While we continue to grow our physical footprint, online and mobile shopping are increasingly popular channels for our customers. Alongside our standard home delivery services, we recently launched the ASAP!

Retail 67
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

ISMG Editors: Breaking Down OT Cybersecurity Challenges

Data Breach Today

Also: Implications of a Critical Linux Utility Backdoor; Focus on Cloud Security In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.

article thumbnail

The convergence of HPC and AI: Driving innovation at speed  

IBM Big Data Hub

In today’s rapidly changing landscape, delivering higher-quality products to the market faster is essential for success. Many industries rely on high-performance computing (HPC) to achieve this goal. Enterprises are increasingly turning to generative artificial intelligence (gen AI) to drive operational efficiencies, accelerate business decisions and foster growth.

article thumbnail

Medical Device Cyberthreat Modeling: Top Considerations

Data Breach Today

Besides not doing cyberthreat modeling at all, some the biggest mistakes medical device manufacturers can make are starting the modeling process too late in the development phase or using it simply as a "paper weight exercise," said threat modeling expert Adam Shostack of Shostack & Associates.

article thumbnail

Microsoft’s new era of AI PCs will need a Copilot key, says Intel via The Verge

IG Guru

Check out the article here. The post Microsoft’s new era of AI PCs will need a Copilot key, says Intel via The Verge first appeared on IG GURU.

Risk 75
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

An integrated asset management data platform

IBM Big Data Hub

Part 2 of this four-part series discusses the complex tasks energy utility companies face as they shift to holistic grid asset management to manage through the energy transition. The first post of this series addressed the challenges of the energy transition with holistic grid asset management. In this part, we discuss the integrated asset management platform and data exchange that unite business disciplines in different domains in one network.

article thumbnail

Friday Squid Blogging: SqUID Bots

Schneier on Security

They’re AI warehouse robots. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.