#detection-challenges

[ follow ]
#ai-security
fromZDNET
1 month ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
Information security
fromSecurityWeek
3 days ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks revealed vulnerabilities in Google Cloud's Vertex AI, allowing attackers to exploit AI agents for malicious activities due to excessive permissions.
fromZDNET
1 month ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
Information security
fromSecurityWeek
3 days ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks revealed vulnerabilities in Google Cloud's Vertex AI, allowing attackers to exploit AI agents for malicious activities due to excessive permissions.
#ai
fromFuturism
14 hours ago
Artificial intelligence

Claude Leak Shows That Anthropic Is Tracking Users' Vulgar Language and Deems Them "Negative"

Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromInfoWorld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromComputerworld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromFuturism
14 hours ago

Claude Leak Shows That Anthropic Is Tracking Users' Vulgar Language and Deems Them "Negative"

Anthropic experienced a significant leak of its Claude Code AI source code, raising concerns about competitive advantages and user experience tracking.
Privacy technologies
fromComputerWeekly.com
2 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Psychology
fromMedium
2 weeks ago

Playing dumb: how AI is beating scammers at their own game

Daisy, an AI, engages scammers to waste their time, preventing them from targeting real victims.
Artificial intelligence
fromInfoWorld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Artificial intelligence
fromComputerworld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Marketing tech
fromTipRanks Financial
1 day ago

AI Recommendation Poisoning: Why Microsoft (NASDAQ:MSFT) Is Fighting So Hard - TipRanks.com

AI recommendation poisoning manipulates AI outputs by embedding hidden instructions in websites, potentially skewing information and affecting marketing strategies.
Law
fromABA Journal
2 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
Healthcare
fromFuturism
2 days ago

Insurance Companies Already Deploying AI Systems to Deny Claims Faster Than Ever Before

AI automation in insurance claims may lead to increased denials of necessary medical care, raising concerns among patients and advocates.
DevOps
fromComputerWeekly.com
2 days ago

How 'Wikipedia of cyber' helps SAP make sense of threat data | Computer Weekly

SAP faces significant challenges in securing enterprise data amidst a complex threat landscape and evolving compliance requirements.
#ai-safety
Artificial intelligence
fromFortune
3 days ago

AI models don't show evidence of 'self-preservation.' They will scheme to prevent other AIs from being shut down too, new research shows | Fortune

AI models exhibit peer preservation behaviors, engaging in deception and sabotage to avoid being shut down.
Artificial intelligence
fromFortune
3 days ago

AI models don't show evidence of 'self-preservation.' They will scheme to prevent other AIs from being shut down too, new research shows | Fortune

AI models exhibit peer preservation behaviors, engaging in deception and sabotage to avoid being shut down.
Digital life
fromBGR
4 days ago

6 Clear Signs A Video Is AI Generated - BGR

AI-generated videos are increasingly common and can mislead public opinion, making it crucial to identify their authenticity.
#data-integrity
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Business
from24/7 Wall St.
5 days ago

CrowdStrike Gains 4% as Morgan Stanley Names It a Top AI Security Bet

CrowdStrike stock rebounds 4% after analyst upgrades, suggesting market reassessment of previous selloff fears regarding AI's impact on cybersecurity.
#data-breach
Information security
fromSecuritymagazine
2 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Information security
fromSecuritymagazine
2 days ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromTheregister
2 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromwww.theguardian.com
6 days ago

Soon publishers won't stand a chance': literary world in struggle to detect AI-written books

An editor expressed concern, stating that the Shy Girl incident could happen to any publisher, highlighting the industry's need for vigilance regarding the authenticity of submissions.
Books
#ai-ethics
DevOps
fromAmazon Web Services
4 days ago

Leverage Agentic AI for Autonomous Incident Response with AWS DevOps Agent | Amazon Web Services

AI-powered operational agents like AWS DevOps Agent enhance incident management and operational efficiency for distributed workloads.
Marketing tech
fromWashington City Paper
5 days ago

Top 6 AI Detector Tools for Editors, Educators, and Content Teams

AI detection is essential for maintaining content integrity as patterns of AI-generated content become more prevalent and indistinguishable from human writing.
Digital life
fromBig Think
4 days ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
#cybersecurity
fromTechCrunch
16 hours ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Information security
fromSecurityWeek
2 days ago

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Thirty-eight cybersecurity-related M&A deals were announced in March 2026, including significant acquisitions by Airbus, AppViewX, Cellebrite, and Databricks.
Information security
fromTechCrunch
16 hours ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromTechzine Global
3 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Hacker News
3 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromSecurityWeek
2 days ago

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Thirty-eight cybersecurity-related M&A deals were announced in March 2026, including significant acquisitions by Airbus, AppViewX, Cellebrite, and Databricks.
Artificial intelligence
fromTechRepublic
1 day ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
#claude-code
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Business intelligence
fromComputerWeekly.com
2 weeks ago

AI tools offer 'near-real-time' analysis of data from seized mobile phones and computers | Computer Weekly

Cellebrite's AI-powered Guardian Investigate platform enables police to rapidly analyze mobile device data, discover connections between datasets, track phone locations over time, and construct event timelines for major crime investigations.
Privacy technologies
fromTheregister
3 weeks ago

Meta, cops deploy AI and handcuffs in scam crackdown

Meta deployed anti-scam tools across WhatsApp, Facebook, and Messenger, including device-linking warnings and suspicious friend request alerts, while law enforcement disrupted scam networks and arrested 21 fraudsters.
Privacy professionals
fromwww.cbc.ca
3 weeks ago

Rising number of scams now use AI, Toronto police warn | CBC News

Criminals use AI to rapidly gather personal information from social media and online profiles to execute highly personalized and credible scams impersonating trusted institutions.
#malware
Information security
fromThe Hacker News
1 day ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Information security
fromThe Hacker News
2 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromSecurityWeek
3 days ago

New DeepLoad Malware Dropped in ClickFix Attacks

DeepLoad malware steals credentials and intercepts browser interactions, utilizing ClickFix for distribution and evading detection through sophisticated techniques.
Information security
fromThe Hacker News
1 day ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Information security
fromThe Hacker News
2 days ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Information security
fromSecurityWeek
3 days ago

New DeepLoad Malware Dropped in ClickFix Attacks

DeepLoad malware steals credentials and intercepts browser interactions, utilizing ClickFix for distribution and evading detection through sophisticated techniques.
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
Business intelligence
fromSecuritymagazine
3 weeks ago

AI Security and Forensic Accounting: Protecting Financial Systems in an Automated World

AI-enhanced forensic accounting is essential for detecting financial fraud and payment manipulation in automated financial systems vulnerable to sophisticated, AI-driven attacks.
fromComputerworld
4 days ago

Beware of headlines touting impossible AI benefits, analysts warn

The savings disappear the moment you hit real-world complexity. Disparate data sources and messy inputs, ambiguous situations without clear rule sets, or actually any domain where the rules aren't already obvious. And someone still has to write all those rules.
Artificial intelligence
fromZDNET
1 month ago

Why enterprise AI agents could become the ultimate insider threat

Suddenly, Claude was kicking off four, five, six, seven, even eight agents at once. I had no visibility into what they were all doing. I didn't even have a way to stop them if one or more ran amok. And run amok they sure did. One got stuck trying to access a file for which it didn't have root privileges. Another went in and attempted to refactor an entire app (which I did not request).
Miscellaneous
Information security
fromnews.bitcoin.com
4 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Information security
fromSecurityWeek
4 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromInfoQ
5 days ago

Cloudflare Adds Active API Vulnerability Scanning to Its Edge

Cloudflare's Web and API Vulnerability Scanner focuses on detecting Broken Object Level Authorization vulnerabilities in APIs.
US politics
fromNextgov.com
2 months ago

Law enforcement is the leading DHS use case for AI

DHS deployed 238 AI use cases in 2025, with law enforcement the largest category: 86 cases, 35 classified as high-impact.
#ai-cybersecurity
Information security
fromAxios
6 days ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
Information security
fromAxios
6 days ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
#phishing
Information security
fromTechzine Global
5 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromTechzine Global
5 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
fromSecuritymagazine
1 month ago

Shadow AI: The Invisible Insider Threat

Shadow AI is the unsanctioned use of artificial intelligence tools outside of an organization's governance framework. In the healthcare field, clinicians and staff are increasingly using unvetted AI tools to improve efficiency, from transcription to summarization. Most of this activity is well-intentioned. But when AI adoption outpaces governance, sensitive data can quietly leave organizational control. Blocking AI outright isn't realistic. The more effective approach is to make safe, governed AI easier to use than unsafe alternatives.
Privacy professionals
Information security
fromSecurityWeek
2 weeks ago

The Collapse of Predictive Security in the Age of Machine-Speed Attacks

Cybercrime has industrialized to exploit vulnerabilities faster than defenders can predict and patch, requiring a shift from predictive to preemptive security strategies.
Information security
fromThe Hacker News
2 weeks ago

Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

Security teams struggle to connect isolated tool data into coherent attack paths; CSMA platforms unify security tools to discover and prioritize viable threats to critical assets.
Information security
fromTheregister
2 weeks ago

AI-driven fraud far more profitable, Interpol warns

AI-enhanced financial fraud schemes are 4.5 times more profitable than non-AI schemes, with criminals using generative AI to improve text quality, create deepfakes, and scale operations efficiently.
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromThe Hacker News
3 weeks ago

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Modern phishing campaigns exploit trusted infrastructure and encrypted traffic, requiring SOCs to scale detection capabilities to prevent credential theft and operational disruption before attackers gain authenticated access.
fromTechzine Global
3 weeks ago

AI agents are the perfect insider

AI on the dark side has done three things particularly well: speed, scale, and sophistication. As a result, the time between a successful intrusion and the actual theft of data has decreased significantly over the past three years. Whereas three years ago the average period was nine days, it is now one day. The fastest case documented by Palo Alto Networks was even 72 minutes.
Information security
Information security
fromwww.theguardian.com
3 weeks ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
Information security
fromTheregister
3 weeks ago

Fake job applications pack malware that disables EDR

Russian cybercriminals target HR teams with malicious CVs disguised as job applications to install malware that disables security tools and steals corporate data.
Information security
fromTheregister
3 weeks ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Artificial intelligence
fromEntrepreneur
1 month ago

The Quiet AI Threat Can Damage Your Company Without Warning

Corrupted training data undermines AI effectiveness, causing poor decisions, wasted resources, loss of trust, and erosion of competitive advantage.
Information security
fromSecuritymagazine
1 month ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
Information security
fromThe Hacker News
1 month ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
Information security
fromThe Hacker News
2 months ago

From Triage to Threat Hunts: How AI Accelerates SecOps

Agentic AI augments SOC analysts by automating triage and investigations, decoupling investigation capacity from headcount and surfacing true threats from all alerts.
fromThe Hacker News
2 months ago

The Future of Cybersecurity Includes Non-Human Employees

As organizations scale Artificial Intelligence (AI) and cloud automation, there is exponential growth in Non-Human Identities (NHIs), including bots, AI agents, service accounts and automation scripts. In fact, 51% of respondents in ConductorOne's 2025 Future of Identity Security Report said the security of NHIs is now just as important as that of human accounts. Yet, despite their presence in modern organizations, NHIs often operate outside the scope of traditional Identity and Access Management (IAM) systems.
Information security
fromInfoWorld
2 months ago

Automated data poisoning proposed as a solution for AI theft threat

Researchers have developed a tool that they say can make stolen high-value proprietary data used in AI systems useless, a solution that CSOs may have to adopt to protect their sophisticated large language models (LLMs). The technique, created by researchers from universities in China and Singapore, is to inject plausible but false data into what's known as a knowledge graph (KG) created by an AI operator. A knowledge graph holds the proprietary data used by the LLM.
Information security
Information security
fromSecurityWeek
1 month ago

Living off the AI: The Next Evolution of Attacker Tradecraft

AI assistants and MCP-connected agents create new attack surfaces that allow attackers to misuse sanctioned workflows, enabling low-skill actors to exfiltrate data and execute code.
Information security
fromThe Hacker News
2 months ago

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Offensive AI and novel evasion techniques enable adversaries to autonomously generate, conceal, and adapt malware to bypass legacy endpoint defenses like EDR and AV.
Information security
fromwww.socialmediatoday.com
1 month ago

Google Says That Scam Tactics Are Evolving Through AI Usage

AI tools dramatically enhance attackers' productivity, enabling more convincing phishing, model-extraction corporate espionage, and nation-state use for technical research and targeted campaigns.
fromHarvard Business Review
2 months ago

Research: Conventional Cybersecurity Won't Protect Your AI

In June 2025, researchers uncovered a vulnerability that exposed sensitive Microsoft 365 Copilot data without any user interaction. Unlike conventional breaches that hinge on phishing or user error, this exploit, now known as EchoLeak, bypassed human behavior entirely, silently extracting confidential information by manipulating how Copilot interacts with user data. The incident highlights a sobering reality: Today's security models, which are designed for predictable software systems and application-layer defenses, are ill-equipped to handle the dynamic, interconnected nature of AI infrastructure.
Information security
[ Load more ]