newsLLMs fueling a “genAI criminal revolution” according to Netcraft reportA surge in websites with AI-generated text is expected to continue as threat actors increasingly adopt the technology. And they’re using LLMs for SEO as well, to help them top search pages.By Lynn Greiner30 Aug 20245 minsPhishingHackingGenerative AI feature Custodians looking to beat offenders in gen AI cybersecurity battleBy Shweta Sharma21 Aug 20248 minsGenerative AISecurity Softwarenews Generative AI takes center stage at Black Hat USA 2024 By Shweta Sharma08 Aug 20246 minsBlack HatGenerative AISecurity Software newsCequence streamlines API security through fresh LLM-specific offeringsBy Shweta Sharma 06 Aug 20244 minsGenerative AISecurity SoftwareAPIs newsHottest selling product on the darknet: Hacked gen AI accountsBy Shweta Sharma 31 Jul 20243 minsIdentity TheftGenerative AI newsNIST releases new tool to check AI models’ securityBy Anirban Ghoshal 29 Jul 20241 minGenerative AI news analysisAI agents can find and exploit known vulnerabilities, study showsBy Maria Korolov 02 Jul 20248 minsZero-day vulnerabilityGenerative AIVulnerabilities newsMicrosoft warns of novel jailbreak affecting many generative AI modelsBy Shweta Sharma 27 Jun 20244 minsGenerative AIVulnerabilities newsMeta delays launch of Meta AI in Europe over disagreement with regulatorsBy Lynn Greiner 17 Jun 20243 minsRegulationData PrivacyGenerative AI ArticlesnewsMicrosoft delays Recall launch amid privacy concernsThe recently announced Windows feature, which takes regular screenshots of a user’s PC activities, will be available first via Windows Insider instead of a wider rollout to Copilot+ devices.By Matthew Finnegan 14 Jun 2024 1 minWindows SecurityGenerative AIData and Information SecuritynewsCriminals, too, see productivity gains from AIA new study looks at how criminals are using AI to further their goals. Bottom line: It’s disturbing.By Lynn Greiner 12 Jun 2024 6 minsGenerative AIThreat and Vulnerability ManagementnewsComplaints in EU challenge Meta’s plans to utilize personal data for AIThe complaint underscores wider privacy concerns and raises the question of whether model users or model creators are responsible for compliance with privacy rules.By Prasanth Aby Thomas 06 Jun 2024 4 minsRegulationData PrivacyGenerative AIfeatureUnauthorized AI is eating your company data, thanks to your employeesLegal documents, HR data, source code, and other sensitive corporate information is being fed into unlicensed, publicly available AIs at a swift rate, leaving IT leaders with a mounting shadow AI mess.By Grant Gross 05 Jun 2024 7 minsData PrivacyGenerative AIIT GovernancenewsBug in EmbedAI can allow poisoned data to sneak into your LLMsThe vulnerability can be used to deceive a user into inadvertently uploading and integrating incorrect data into the application’s language model.By Shweta Sharma 31 May 2024 3 minsGenerative AIVulnerabilitiesnewsOpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert OpsOpenAI’s generative AI tools were used to create and post propaganda content on various geo-political and socio-economic issues across social media platforms, the company said.By Gyana Swain 31 May 2024 4 minsGenerative AInewsMicrosoft Azure’s Russinovich sheds light on key generative AI threatsGenerative AI models have a larger attack surface than many CSOs might think. Microsoft Azure’s CTO walked through some of the more significant challenges facing developers and defenders.By David Strom 22 May 2024 4 minsGenerative AIData and Information SecuritynewsPalo Alto launches AI-powered solutions to fight AI-generated cyberthreats The suite is powered by Palo Alto’s proprietary solution, Precision AI, which integrates machine learning, deep learning, and generative AI technologies.By Prasanth Aby Thomas 09 May 2024 3 minsGenerative AISecurity SoftwarenewsSecuriti adds distributed LLM firewalls to secure genAI applicationsThe new offering is aimed at protecting against prompt injection, data leakage, and training data poisoning in LLM systems. By Shweta Sharma 30 Apr 2024 4 minsGenerative AInewsTop cybersecurity product news of the weekNew product and service announcements from Forcepoint, Ionix, Amplifier Secutiry and Torq.By CSO staff 26 Apr 2024 81 minsGenerative AISecurityfeatureKeeping up with AI: OWASP LLM AI Cybersecurity and Governance ChecklistOWASP’s checklist provides a concise and quick resource to help organizations and security leaders deal with generative AI and LLMs.By Chris Hughes 14 Mar 2024 10 minsGenerative AISecurity PracticesOpen SourcenewsMicrosoft reveals general availability of Copilot for SecurityAvailable worldwide on April 1, Microsoft Copilot for Security uses generative AI to provide incident summaries, step-by-step remediation guidance, and reverse-engineering of scripts.By Samira Sarraf 13 Mar 2024 4 minsGenerative AIThreat and Vulnerability Management Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity whitepaper Unlock the power of AI and ML for data protection By Cohesity Inc. 26 Aug 2024Artificial IntelligenceBusiness OperationsMachine Learning View all Explore a topic Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Hiring Industry Internet of Things IT Leadership Network Security View all topics All topics Close Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Hiring Industry Internet of Things IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me moreLatestArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO