article thumbnail

AI Security Risk Assessment Tool

Schneier on Security

Microsoft researchers just released an open-source automation tool for security testing AI systems: “ Counterfit.” ” Details on their blog.

Risk 120
article thumbnail

GUEST ESSAY: Marshaling automated cybersecurity tools to defend automated attacks

The Last Watchdog

Cybersecurity tools evolve towards leveraging machine learning (ML) and artificial intelligence (AI) at ever deeper levels, and that’s of course a good thing. Sophisticated tools were employed to auto generate content that compelled users to respond. Related: Business logic hacks plague websites. Accelerate time-sensitive processes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fulton County, Security Experts Call LockBit’s Bluff

Krebs on Security

Security experts say LockBit was likely bluffing and probably lost most of the data when the gang’s servers were seized this month by U.S. ’s National Crime Agency (NCA) took over LockBit’s online infrastructure , replacing the group’s homepage with a seizure notice and links to LockBit ransomware decryption tools.

Security 240
article thumbnail

AuKill tool uses BYOVD attack to disable EDR software

Security Affairs

Ransomware operators use the AuKill tool to disable EDR software through Bring Your Own Vulnerable Driver (BYOVD) attack. Sophos researchers reported that threat actors are using a previously undocumented defense evasion tool, dubbed AuKill, to disable endpoint detection and response (EDR) software.

article thumbnail

GUEST ESSAY: Advanced tools are ready to help SMBs defend Microsoft 365, Google Workspace

The Last Watchdog

Related: Deploying human sensors Additionally, with tools like ChatGPT, almost anyone can create new malware and become a threat actor. Another report by Vade completed last year found that 87 percent of respondents agreed their organization could take the threat from email security more seriously. This is a harmful misconception.

article thumbnail

China-linked APT41 group spotted using open-source red teaming tool GC2

Security Affairs

China-linked APT41 group used the open-source red teaming tool GC2 in an attack against a Taiwanese media organization. Google Threat Analysis Group (TAG) team reported that the China-linked APT41 group used the open-source red teaming tool Google Command and Control ( GC2 ) in an attack against an unnamed Taiwanese media organization.

Cloud 95
article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Cisco’s $28 billion acquisition of Splunk comes at an inflection point of security teams beginning to adopt to working with modern, cloud-native data lakes. Related: Dasera launches new Snowflake platform For years, Splunk has been the workhorse SIEM for many enterprise Security Operation Centers (SOCs).