Remove Authentication Remove Generative AI Remove Malware
article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

In the Unit 42 Threat Frontier: Prepare for Emerging AI Risks report, we aim to strengthen your grasp of how generative AI (GenAI) is reshaping the cybersecurity landscape. We use it to bypass defenses, automate reconnaissance, generate authentic-looking content and create convincing deepfakes.

Malware 99
article thumbnail

US Air Force seeks generative AI test pilots

CIO

Proof that even the most rigid of organizations are willing to explore generative AI arrived this week when the US Department of the Air Force (DAF) launched an experimental initiative aimed at Guardians, Airmen, civilian employees, and contractors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Beyond the inbox: ThreatLabz 2025 Phishing Report reveals how phishing is evolving in the age of genAI

CIO

Todays attackers are leveraging generative AI (GenAI) to deliver hyper-targeted scams, transforming every email, text, or call into a calculated act of manipulation. as a result of stronger email authentication protocols like DMARC and Googles sender verification, which blocked 265 billion unauthenticated emails.

Report 114
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. Where can you find a comprehensive guide of tools to secure generative AI applications? Dive into six things that are top of mind for the week ending Nov.

article thumbnail

Top 5 Security Trends for CIOs

CIO

Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. In reality, generative AI presents a number of new and transformed risks to the organization. The malware itself is easy to buy on the Dark Web.

Trends 190
article thumbnail

Cybersecurity Snapshot: AI Security Roundup: Best Practices, Research and Insights

Tenable

Harden configurations : Follow best practices for the deployment environment, such as using hardened containers for running ML models; applying allowlists on firewalls; encrypting sensitive AI data; and employing strong authentication. One of AI's significant advantages in threat detection is its ability to be proactive.

article thumbnail

Don’t gamble with your identity verification practices

CIO

I also emphasized that companies need to urgently review their employee access protocol, writing that companies must “ make it a point to do continuous employee training to help your teams avoid being duped by phishing and malware tactics.” It might make us feel safer and more secure in our connected world. Ransomware, Security