AI Tools
RAD Security Combines AI With Behavioral Analytics to Improve Cybersecurity
RAD Security this week at the Black Hat USA 2024 conference revealed it has added artificial intelligence (AI) capabilities to its cloud detection and response (CDR) platform as part of an ongoing ...
Security Boulevard
Rethinking Cybersecurity in the Age of AI
IT managers and CSOs need to rethink their approach to cybersecurity and protect their organizations from this new breed of AI-powered attacks ...
Security Boulevard
IRONSCALES Applies Generative AI to Phishing Simulation
IRONSCALES has made generally available a phishing simulation tool that makes use of generative artificial intelligence (AI) to enable cybersecurity teams to create as many as 2,000 simulations of a spear phishing ...
Security Boulevard
Salt Security Applies Generative AI to API Security
Salt Security claims Pepper can decrease the time it takes to surface actionable security-related information by as much as 91% ...
Security Boulevard
How to make your phishing campaign a success
Mathay Kahraman | | AI Tools, cyberattack, Cybersecurity, enterprise, enterprise security, IBM, Phishing, technology
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading ...
Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
Tom Eston | | AI Tools, ATM fraud, Chase Bank, Contactless Payment, Convenience vs Security, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Exynos Chipsets, Hidden Cameras, Information Security, Infosec, mobile device security, PIN Security, Podcast, Podcasts, Privacy, Remote Code Execution, ReSpeacher, Samsung Chipsets, security, Skimmer Technology, social engineering attacks, Tap-Enabled Debit Cards, Tavora, technology, Voice Cloning, Voice over LTE, Weekly Edition, WiFi Calling, zero-day vulnerabilities
In this episode we discuss Google’s discovery of 18 zero-day vulnerabilities in Samsung’s Exynos chipsets. We examine an AI-assisted social engineering campaign that combines emerging technologies with classic techniques. Finally, we look ...