Malware Hidden Inside Neural Network Models has Over 90% Efficacy

Malware Hidden Inside Neural Network Models has Over 90% Efficacy - Cybersecurity news - New Cyber Technologies
A new research attack method demonstrated that replacing up to 50% of neurons in the AlextNet model with malware can go undetected under security tools, as the model’s accuracy remained above 93.1%. Popular technologies such as machine learning and neural networks are still at their nascent stage, ... Read More

Open-source tool for hardening commonly used HMI/SCADA system

Otorio, a provider of OT security and digital risk management solutions, released an open-source tool designed for hardening the security of GE Digital’s CIMPLICITY, a commonly used HMI/SCADA system.

Intel adds ransomware detection capabilities at the silicon level

Intel announced it is adding ransomware detection capabilities to its new 11th Gen Core vPro processors through improvements to its Hardware Shield and Threat Detection Technology (TDT).

Ghidra 101: Slice Highlighting

Program slicing is a way of abstracting code into smaller groups of statements called slices. Slices are formed by following how a particular variable’s value affects or is affected by other variables

CISA releases Azure, Microsoft 365 malicious activity detection tool

The Cybersecurity and Infrastructure Security Agency (CISA) released a PowerShell-based tool that helps detect potentially compromised applications and accounts in Azure/Microsoft 365 environments.

Open source privacy project TinyCheck turns your Raspberry Pi into a stalkerware detection unit

TinyCheck is open source software designed to be used on a Raspberry Pi with WiFi dongle and touchscreen. It was developed by Félix Aimé, a senior security researcher at Kaspersky Lab.

Google open-sources Atheris, a tool for finding security bugs in Python code

Google's security experts have open-sourced another automated fuzzing utility in the hopes that developers will use it to find security bugs and patch vulnerabilities before they are exploited.

Artificial intelligence could be used to hack connected cars, drones warn security experts

Cybercriminals could exploit emerging technologies including artificial intelligence and machine learning to help conduct attacks against autonomous cars, drones, and IoT-connected vehicles.

New Proposed DNS Security Features Released

Authenticated Resolution could help thwart DDoS attacks — attackers wouldn't be able to access the actual addresses of their targets because they would not be authorized to do so.

Researchers Say They've Developed Fastest Open Source IDS/IPS

With a five-processor core, "Pigasus" delivers the same performance as a system with between 100 and 700 cores, according to a team from Carnegie Mellon University's CyLab.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags