article thumbnail

3 ways criminals use artificial intelligence in cybersecurity attacks

Tech Republic Security

Bad actors use machine learning to break passwords more quickly and build malware that knows how to hide, experts warn.

article thumbnail

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Tech Republic Security

ESET's latest report highlights the abuse of the ChatGPT name, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware.

Malware 177
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cylance brings AI and machine learning to anti-virus protection

CTOvision

Read Boing Boing’s review of Cylance’s new anti-virus protection powered by artificial intelligence and machine learning: Malware is everywhere. 350,000 new pieces of malware are discovered every day, which breaks […].

article thumbnail

Using AI-enhanced malware, researchers disrupt algorithms used in antimalware

Tech Republic Security

Artificial intelligence algorithms are involved in a cyber arms race. Who will win: Antimalware developers or malware developers?

Malware 138
article thumbnail

HP aims to secure its PC portfolio with Sure Sense malware blocker

CTOvision

HP on Tuesday announced a bevy of PC updates and new features, as well as the formal release of HP Sure Sense, the company’s new software that uses AI to prevent and block malware in near-real-time, including ransomware and previously unknown malware.

HP 207
article thumbnail

Non-malware attacks pose bigger threat than malicious software

Computer Weekly

Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers

Malware 100
article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […].

Malware 167