AI Security ‘Is a Software Problem’
Securing AI systems and LLMs seems like a daunting task, but experts say the same principles that apply to software security can
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Securing AI systems and LLMs seems like a daunting task, but experts say the same principles that apply to software security can
Edge devices have become the go-to targets for cybercriminals and state actors, and experts say that will continue for the
The Verizon 2024 Data Breach Investigations Report shows a 180 percent increase in the use of vulnerability exploits in breaches
The ransomware attack on Change Healthcare included the theft of PHI and PII, the company said.
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler (CVE-2022-38028) for several years.
Europol and a collection of UK law enforcement agencies have disrupted the LabHost phishing platform, which targeted victims globally.
Cody Stokes, a security leader at Procellis Technology, joins Dennis Fisher to talk about his time in the Marine Corps, the challenges of breaking into the cybersecurity field, and the fulfillment he gets from helping to protect users.
Many versions of the PuTTY client have a weakness that can generate biased ECDSA nonces and enable an attacker to eventually recover private encryption keys.