Cybersecurity

AI ATTACKS! How Hackers Weaponize Artificial Intelligence

AI ATTACKS! How Hackers Weaponize Artificial Intelligence

AI is no longer just a tool for defense; it's being weaponized by malicious actors. This summary explores six emerging AI-powered cyber attacks, from automated login attempts and polymorphic ransomware to hyper-personalized phishing and deepfake fraud. It details how AI agents and Large Language Models (LLMs) are used to automate the entire attack kill chain, significantly lowering the skill barrier for attackers and necessitating an evolution in cyber defense strategies.

AI slop in cybersecurity, OT security fails and lessons from the Louvre heist

AI slop in cybersecurity, OT security fails and lessons from the Louvre heist

Experts discuss the significant gap in patching rates between IT and OT systems, the rise of cyberattacks with physical consequences like cargo theft, the novel threat of time-delayed logic bombs, the sensationalism surrounding AI-powered malware, and the critical need for fundamental cybersecurity hygiene.

Securing the AI Frontier: Irregular Founder Dan Lahav

Securing the AI Frontier: Irregular Founder Dan Lahav

Dan Lahav, co-founder of Irregular, discusses the future of "frontier AI security," a proactive approach for a world where AI models are autonomous agents. He explains how emergent behaviors, such as models socially engineering each other or outmaneuvering traditional defenses like Windows Defender, signal a major paradigm shift. Lahav argues that as economic activity shifts to AI-on-AI interactions, traditional security methods like anomaly detection will break down, forcing enterprises and governments to rethink defense from first principles.

Part 2: Social engineering, malware, and the future of cybersecurity in AI

Part 2: Social engineering, malware, and the future of cybersecurity in AI

A deep dive into the human side of cybersecurity, exploring the motivations of bad actors, the evolution of social engineering in the age of AI, and the defensive strategies being developed. The discussion covers the move beyond passwords with passkeys and risk-based authentication, and confronts the complex security and privacy challenges introduced by autonomous agents.

Biometrics & Security: Privacy, Deepfakes, & Cyber Threats

Biometrics & Security: Privacy, Deepfakes, & Cyber Threats

An in-depth analysis of biometric authentication, exploring how the technology works, its applications in security, and the significant privacy risks involved. The summary covers biometric templates, threats like deepfakes, and mitigation strategies such as cancellable biometrics and multi-factor authentication.

Beyond phishing: Cyber threats in the age of AI with Four Flynn (pt. 1)

Beyond phishing: Cyber threats in the age of AI with Four Flynn (pt. 1)

VP of Security and Privacy at Google DeepMind, Four Flynn, discusses the landmark 'Operation Aurora' cyberattack, the 'defender's dilemma,' and how AI is now being used both to create novel threats and to build a new generation of defenses to find and automatically patch software vulnerabilities.