Techno Blender
Digitally Yours.
Browsing Tag

Cyber

The Biggest Cyber Threats Of 2024 And How To Avoid Them

Keeping our devices and data protected against cyber threats is a constant battle, and it shows no signs of slowing down in 2024. New research from security companies such as Norton, Avast and Gen have uncovered the biggest predicted risks in the year ahead, as well as some tools and techniques to counter them. The threats include potential AI risks, malware that can be bought ‘off the shelf’ by cybercriminals, as well as new email scams that can trick you into revealing valuable information. To ensure you don’t…

Nation-State Hackers Using OpenAI’s ChatGPT to Boost Cyber Operations, Microsoft Says

Nation-state hackers are using artificial intelligence to refine their cyberattacks, according to a report published by Microsoft Corp. on Wednesday. Russian, North Korean, Iranian and Chinese-backed adversaries were detected adding large-language models, like OpenAI's ChatGPT, to their toolkit, often in the preliminary stages of their hacking operations, researchers found. Some groups were using the technology to improve their phishing emails, gather information on vulnerabilities and troubleshoot their own technical…

Microsoft: Microsoft says US rivals are beginning to use generative AI in offensive cyber operations

Microsoft said Wednesday that US adversaries - chiefly Iran and North Korea and to a lesser extent Russia and China - are beginning to use generative artificial intelligence to mount or organize offensive cyber operations. The technology giant said it detected and disrupted, in collaboration with business partner OpenAI, threats that used or attempted to exploit AI technology they had developed. In a blog post, the Redmond, Washington, company said the techniques were "early-stage" and neither "particularly novel or…

Microsoft and OpenAI detect and disrupt nation-state cyber threats that use AI, report shows

For example, Emerald Sleet, a North Korean threat actor, leveraged LLMs to research think tanks and experts on North Korea, generate content that would likely be used in spear-phishing campaigns, understand publicly known vulnerabilities, troubleshoot technical issues, and even assist with using various web technologies, according to the report. Also: The best VPN services (and how to choose the right one for you)Similarly, Crimson Sandstorm, an Iranian threat actor, used LLMs for technical assistance, including

Microsoft and OpenAI identify and disrupt nation-state cyber threats that use AI, new report shows

For example, Emerald Sleet, a North Korean threat actor, leveraged LLMs to research think tanks and experts on North Korea, generate content that would likely be used in spear-phishing campaigns, understand publicly known vulnerabilities, troubleshoot technical issues, and even assist with using various web technologies, according to the report. Also: The best VPN services (and how to choose the right one for you)Similarly, Crimson Sandstorm, an Iranian threat actor, used LLMs for technical assistance, including

Secure a reliable cyber security education for $46

Save 65% on these cyber security courses. StackSocialCyber security is something that is needed by virtually everybody in today's society. Whether you're a business leader who is looking for ways to improve protection while keeping costs manageable, an aspiring IT professional or specialist, or an everyday person, brushing up on cyber security can make a positive difference in your life. The 2023 Masters in Cyber Security Certification Bundle is on sale for just $46 (reg. $135), and it features nine courses and nearly

Beware of these 5 WhatsApp scams! Avoid these shocking cyber threats this way

WhatsApp is one of the most used apps in various parts of the world as it helps users stay connected with their friends and family. Now, the app is also being used for business purposes as its features have expanded over time. However, there have been several cases of WhatsApp scams that not only manipulate people but also hack their devices to commit crimes. Shockingly, WhatsApp users have now become a soft target for scammers to trick and steal their money or even blackmail them. To stay aware and avoid getting trapped…

Chinese hackers are determined to ‘wreak havoc’ on US critical infrastructure, FBI director warns

Chinese government hackers are busily targeting water treatment plants, the electrical grid, transportation systems and other critical infrastructure inside the United States, FBI Director Chris Wray told House lawmakers Wednesday in a fresh warning from Washington about Beijing's global ambitions.Underscoring the threat, the Justice Department and FBI announced just before the hearing that they had disrupted a botnet of hundreds of U.S.-based small office and home routers owned by private citizens and companies and…

Top 3 risks from tech by 2040: AI rivalry to invisible cyber attacks, check horror forecast

Bewilderingly rapid changes are happening in the technology and reach of computer systems. There are exciting advances in artificial intelligence, in the masses of tiny interconnected devices we call the “Internet of Things” and in wireless connectivity. Unfortunately, these improvements bring potential dangers as well as benefits. To get a safe future we need to anticipate what might happen in computing and address it early. So, what do experts think will happen, and what might we do to prevent major problems?To answer…