article thumbnail

10 things to watch out for with open source gen AI

CIO Business Intelligence

Even if you don’t have the training data or programming chops, you can take your favorite open source model, tweak it, and release it under a new name. According to Stanford’s AI Index Report, released in April, 149 foundation models were released in 2023, two-thirds of them open source.

article thumbnail

Top 5 Security Trends for CIOs

CIO Business Intelligence

A second, more pernicious risk is the fact that ChatGPT can write malware. Sometimes the malware has errors, but with simple repetition the hacker can generate multiple working versions of the code. Such polymorphic malware is particularly hard to detect, because it may be different from one attack to another.

Trends 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

String of fileless malware attacks possibly tied to single hacker group

Network World

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools, and fileless malware techniques might be the work of a single group of hackers.

Malware 60
article thumbnail

5 reasons to shift from Flash to HTML5 for Mobile Learning

Kitaboo

Besides, it could easily be misused by malware developers. In fact, in one of his articles, he said, “new open standards created in the mobile era, such as HTML5, will win on mobile devices (and on PCs too)”. Since mobile devices do not support Flash, these courses are locked for desktop use.

Mobile 88
article thumbnail

How to manage cloud exploitation at the edge

CIO Business Intelligence

Malware Distribution: Cloud exploitation can involve hosting or distributing malware through cloud-based platforms or services. Attackers may upload malicious files or applications to cloud storage or use cloud infrastructure to propagate malware to unsuspecting users. Second, cyber criminals are well-organized and act fast.

Cloud 92
article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

Malvertising acts as a vessel for malware propagation. Scammers and malware operators are increasingly adept at mimicking popular brands in their ad snippets, which makes it problematic for the average user to tell the wheat from the chaff. Of course, good old vigilance won't go amiss.

article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it’s an easy one to believe until you start noticing strange behavior on your system. Courses Free in May. This course covers objectives for the LPI Essentials exam version 1.5. Linux Study Group in May.

Linux 113