Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Artificial Intelligence: Thinking Beyond Artificiality with Larry Godec

Artificial intelligence (AI) is the hot topic of the moment, so we asked Tanium Executive Advisory Board member Larry Godec for his thoughts on generative AI in general and its more well-known applications, such as ChatGPT. Larry is the former CIO of First American Financial and a trusted advisor on AI topics to some of the world’s largest enterprises.

New Amazon-Themed Phishing Campaign Targets Microsoft Live Outlook Users

Several months ago, Netskope Threat Labs uncovered a surge in PDF phishing attachments infiltrating Microsoft Live Outlook. These attacks were part of a larger series of phishing campaigns aimed to trick unsuspecting users. Upon closer examination, it's now apparent that the majority of these campaigns centered around Amazon-themed scams, with occasional diversions into Apple and IRS-themed phishing attempts.

Protecting Users from Malicious Sites with Falcon for Mobile

Today, mobile devices are ubiquitous within enterprise environments. But with their proliferation, it provides adversaries with yet another attack surface with which they can target users and cause a breach. From phishing attacks to malicious apps, mobile users tend to let their guard down and potentially click on obfuscated links to malicious sites. Falcon for Mobile protects users by preventing connections to malicious sites on both iOS and Android devices.

Demystifying Deep Learning: Unraveling the Brain-Inspired Evolution of AI || Razorthorn Security

Dive deep into the world of artificial intelligence with our latest video, "Unlocking the Power of Deep Learning: Exploring the Brain-Inspired Revolution in Machine Learning." In this comprehensive exploration, we'll unravel the fascinating concept of deep learning, a subset of machine learning, and understand how it's attempting to simulate the complexity of the human brain.

A Deep Dive Into Cloud Security Assessments

Cloud platforms offer unparalleled scalability, flexibility, and cost-efficiency. However, the convenience and advantages of the cloud are accompanied by significant security challenges. Hackers are constantly trying to exploit weak cloud configuration settings, which is why it’s important to have visibility into the security of your organization’s cloud infrastructure.

AI Hallucinations and Manipulation: How to Use AI Coding Tools Securely (part 1)

Generative AI can help you write code faster, but is it secure? Learn how you can leverage the power of AI to increase your velocity while mitigating risks and staying secure. Learn from security experts Liran Tal & Simon Maple in a hands-on session where they walk through.

Human-Crafted Phishing Emails Only Three Percent More Successful Than AI-Generated Ones, According To IBM

Red teamers at IBM X-Force warn that AI-generated phishing emails are nearly as convincing as human-crafted ones, and can be created in a fraction of the time. The researchers tricked ChatGPT into quickly crafting a phishing lure, then tested the lure against real employees.

Top 18 AI Testing Tools in 2024

The impact of AI tools on software development is starting to make itself felt. As the productivity of developers increases, so does the necessity for software testing. Luckily, AI is also seeing increasing adoption in testing, enabling dev teams to ensure robust and secure software despite increasing output. In this in-depth guide, we will explore the top 18 AI testing tools in 2023 that have the potential to take your testing processes to the next level. Overview.

DDoS threat report for 2023 Q3

Welcome to the third DDoS threat report of 2023. DDoS attacks, or distributed denial-of-service attacks, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.

Email Routing subdomain support, new APIs and security protocols

It's been two years since we announced Email Routing, our solution to create custom email addresses for your domains and route incoming emails to your preferred mailbox. Since then, the team has worked hard to evolve the product and add more powerful features to meet our users' expectations. Examples include Route to Workers, which allows you to process your Emails programmatically using Workers scripts, Public APIs, Audit Logs, or DMARC Management.