Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence
Current LLMs are just not mature enough for high-level tasks
Results driven. Results delivered.
Current LLMs are just not mature enough for high-level tasks
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!
Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules.
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Current cryptographic security methods watch out – quantum computing is coming for your lunch.
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.