#ai-and-cybersecurity-convergence

[ follow ]
#cybersecurity
fromTechCrunch
7 hours ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

fromTechCrunch
1 day ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

fromTNW | Eu
6 hours ago
Information security

European Commission breached after hackers poisoned open-source security tool Trivy

Information security
fromTechCrunch
7 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
EU data protection
fromSecurityWeek
9 hours ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
EU data protection
fromTechCrunch
1 day ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTechzine Global
3 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromTNW | Eu
6 hours ago

European Commission breached after hackers poisoned open-source security tool Trivy

A major data breach at the European Commission was caused by TeamPCP exploiting a supply chain attack on the Trivy security tool.
Artificial intelligence
fromTechRepublic
1 day ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
#amazon
Business
from24/7 Wall St.
5 hours ago

Amazon's $200 Billion AI Spending Spree Is Lighting the Fuse for Explosive Growth

Amazon's $200 billion capital expenditure plan is a strategic investment fueling AWS growth and positioning the company for future expansion.
Business
from24/7 Wall St.
5 hours ago

Amazon's $200 Billion AI Spending Spree Is Lighting the Fuse for Explosive Growth

Amazon's $200 billion capital expenditure plan is a strategic investment fueling AWS growth and positioning the company for future expansion.
Cryptocurrency
fromnews.bitcoin.com
8 hours ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#meta
Information security
fromWIRED
22 hours ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Information security
fromWIRED
22 hours ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
#ai
Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromFortune
21 hours ago
Digital life

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

Digital life
fromFortune
9 hours ago

AI's next frontier is the real world | Fortune

AI has transformed digital interactions, yet the physical world still relies on outdated identity verification methods.
Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Digital life
fromFortune
21 hours ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Psychology
fromMedium
2 weeks ago

Playing dumb: how AI is beating scammers at their own game

Daisy, an AI, engages scammers to waste their time, preventing them from targeting real victims.
Law
fromABA Journal
2 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
Marketing tech
fromTipRanks Financial
1 day ago

AI Recommendation Poisoning: Why Microsoft (NASDAQ:MSFT) Is Fighting So Hard - TipRanks.com

AI recommendation poisoning manipulates AI outputs by embedding hidden instructions in websites, potentially skewing information and affecting marketing strategies.
#artificial-intelligence
fromBusiness Insider
2 days ago
Artificial intelligence

How AI could destroy - or save - humanity, according to former AI insiders

Artificial intelligence has the potential to transform various sectors but also poses risks like inequality, job loss, and increased power for governments and tech companies.
Artificial intelligence
fromBusiness Insider
2 days ago

How AI could destroy - or save - humanity, according to former AI insiders

Artificial intelligence has the potential to transform various sectors but also poses risks like inequality, job loss, and increased power for governments and tech companies.
DevOps
fromTechzine Global
1 day ago

IGEL breaks down the wall between IT and OT

IGEL is enhancing security and manageability in OT environments through its platform and Preventative Security Model.
#quantum-computing
Science
fromNature
2 days ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Information security
fromTechRepublic
3 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Science
fromNature
2 days ago

'It's a real shock': quantum-computing breakthroughs pose imminent risks to cybersecurity

Quantum hackers could pose a serious threat to digital security by the end of this decade, much sooner than previously anticipated.
Information security
fromTechRepublic
3 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Media industry
fromwww.businessinsider.com
1 day ago

Get ready for a wave of TBPN clones after its blockbuster OpenAI deal

OpenAI acquired the livestream talk-show startup TBPN, highlighting its significant influence on the tech industry and the rise of similar shows.
Writing
fromDefector
3 days ago

Go Ahead and Use AI. It Will Only Help Me Dominate You. | Defector

AI can be a valuable tool in the writing process, and its use should be supported rather than criticized.
#data-integrity
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#ai-security
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
Information security
fromTechRepublic
1 week ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Information security
fromTechzine Global
2 weeks ago

Harness secures AI code and AI apps with two new modules

Harness launches AI Security and Secure AI Coding modules to detect, test, and protect AI components throughout the application lifecycle while scanning AI-generated code for vulnerabilities in real time.
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
Information security
fromTechRepublic
1 week ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Information security
fromTechzine Global
2 weeks ago

Harness secures AI code and AI apps with two new modules

Harness launches AI Security and Secure AI Coding modules to detect, test, and protect AI components throughout the application lifecycle while scanning AI-generated code for vulnerabilities in real time.
#ai-governance
Business intelligence
fromTechzine Global
1 day ago

All shook up, IFS unlocks asset-based pricing for enterprise AI

IFS introduces an outcomes-based pricing model for enterprise AI, aligning software costs with operational assets instead of user counts.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#data-breach
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromSilicon Canals
2 days ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Privacy professionals
fromSilicon Canals
1 day ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromSilicon Canals
2 days ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Business intelligence
fromComputerWeekly.com
2 days ago

Wireless AI paradox emerges as Wi-Fi evolves into strategic growth engine | Computer Weekly

Strategic investments in wireless and AI are crucial for businesses to achieve operational efficiency and productivity gains.
DevOps
fromTechzine Global
3 days ago

IGEL brings 'Smarter, Zero Trust' approach Contextual Access to endpoints

IGEL's Contextual Access enhances endpoint security by adapting access rights based on user, device, location, and trust status.
#openai
#ai-agents
Business intelligence
fromInfoWorld
2 days ago

Kilo targets shadow AI agents with a managed enterprise platform

KiloClaw for Organizations enhances AI agent management with centralized governance, addressing security and compliance concerns for enterprises.
Business intelligence
fromInfoWorld
2 days ago

Kilo targets shadow AI agents with a managed enterprise platform

KiloClaw for Organizations enhances AI agent management with centralized governance, addressing security and compliance concerns for enterprises.
DevOps
fromTheregister
2 days ago

IBM wants Arm software on its mainframes for AI support

IBM and Arm are collaborating to enhance enterprise systems for AI and data-intensive workloads using Arm chips.
#ai-ethics
fromTechzine Global
2 days ago

IGEL OS can now run AI models locally on endpoints

AI Armor provides dynamic runtime security and relies on a central policy engine in the Universal Management Suite (UMS) to meet compliance requirements, ensuring that organizations can manage their security effectively.
DevOps
Artificial intelligence
fromInfoWorld
1 day ago

Google gives enterprises new controls to manage AI inference costs and reliability

Gemini API introduces Flex and Priority tiers for managing AI inference workloads based on criticality and cost.
Information security
fromTNW | Insights
5 hours ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
#ai-models
fromTNW | Apps
1 day ago
Artificial intelligence

Microsoft launches three in-house AI models in direct challenge to OpenAI

Microsoft has launched three in-house AI models that compete directly with OpenAI, marking a significant shift in its AI strategy.
Artificial intelligence
fromTechRepublic
1 week ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

The tech industry's rapid advancement in AI tools brings significant privacy and security risks alongside innovation.
Artificial intelligence
fromTNW | Apps
1 day ago

Microsoft launches three in-house AI models in direct challenge to OpenAI

Microsoft has launched three in-house AI models that compete directly with OpenAI, marking a significant shift in its AI strategy.
Artificial intelligence
fromTechRepublic
1 week ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

The tech industry's rapid advancement in AI tools brings significant privacy and security risks alongside innovation.
fromZDNET
1 month ago

Why enterprise AI agents could become the ultimate insider threat

Suddenly, Claude was kicking off four, five, six, seven, even eight agents at once. I had no visibility into what they were all doing. I didn't even have a way to stop them if one or more ran amok. And run amok they sure did. One got stuck trying to access a file for which it didn't have root privileges. Another went in and attempted to refactor an entire app (which I did not request).
Miscellaneous
Artificial intelligence
fromSilicon Canals
2 days ago

The $50 AI revolution: Why smaller models built for sovereignty may matter more than the trillion-dollar arms race - Silicon Canals

Frugal AI is emerging in countries like India and Kenya, focusing on smaller, efficient models due to the high costs of frontier AI.
Artificial intelligence
fromMedium
4 days ago

What Will AI Coworkers Look Like for the Rest of 2026?

AI coworkers are now integral to workflows, executing tasks and returning results, transforming how teams operate by 2026.
Artificial intelligence
fromFortune
3 days ago

AI models don't show evidence of 'self-preservation.' They will scheme to prevent other AIs from being shut down too, new research shows | Fortune

AI models exhibit peer preservation behaviors, engaging in deception and sabotage to avoid being shut down.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromReadWrite
1 week ago

The CISO Struggle: How AI is Changing the Data Security Landscape

Generative AI adoption is rapid, but security governance is lagging, creating significant risks for organizations.
Information security
fromSecurityWeek
2 weeks ago

The Collapse of Predictive Security in the Age of Machine-Speed Attacks

Cybercrime has industrialized to exploit vulnerabilities faster than defenders can predict and patch, requiring a shift from predictive to preemptive security strategies.
fromFast Company
1 month ago

We're entering the era of 'AI unless proven otherwise'

On the way to work, you see a TikTok video of the president admitting to a crime. In the elevator, you hear your favorite band, but the song is completely unfamiliar. At your desk, you open an email from an executive in another department. It contains valid sales information and discusses a relevant legal issue, but the wording sounds oddly wooden. After lunch, the CEO sends all managers a link to a new app she had casually proposed just a few days earlier.
Artificial intelligence
fromComputerWeekly.com
2 months ago

AI slop pushes data governance towards zero-trust models | Computer Weekly

Unverified and low quality data generated by artificial intelligence (AI) models - often known as AI slop - is forcing more security leaders to look to zero-trust models for data governance, with 50% of organisations likely to start adopting such policies by 2028, according to Gartner's seers. Currently, large language models (LLMs) are typically trained on data scraped - with or without permission - from the world wide web and other sources including books, research papers, and code repositories.
Artificial intelligence
Information security
fromTechzine Global
2 months ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
[ Load more ]