ai (123)

31000889871?profile=RESIZE_400xThe quantum technology landscape is rapidly evolving from speculative science to a tangible economic powerhouse, with experts forecasting a market worth up to $97 billion by 2035.  According to a major McKinsey report, quantum computing, communication, and sensing could generate as much as $97 billion in global revenue within a decade, making 2025 a pivotal year in the transition from concept to deployment.  McKinsey's analysis highlights a decisive shift in 2024, in which the focus shifted from

30987756482?profile=RESIZE_400xRecently, a good friend of mine sent along a joke.  Dave has a dry sense of humor, often sprinkled with sarcasm.  Since many areas of the US have opening seasons for hunting, our online conversations were on that subject.  Dave then posted: “I think I want to try hunting.  When does meatloaf season open?”  That’s so Dave.

To be additionally funny, I asked Artificial Intelligence (AI) about “meatloaf hunting season.”  The immediate response was, “There is no official hunting season for an animal

30986297880?profile=RESIZE_400xDeep fakes are increasingly sophisticated digital manipulations that can convincingly impersonate individuals or create misleading content.  To stop the spread and impact of deep fakes, it is essential to verify the authenticity of messages, images, and videos before trusting them.  Employing advanced detection tools, such as AI-driven deep fake detectors, and cross-referencing content with trusted sources can help identify fraudulent material.  Additionally, raising awareness and educating empl

30984543477?profile=RESIZE_400xState-backed hackers are for the first time deploying malware that uses large language models during execution, allowing them to dynamically generate malicious scripts and evade detection, according to new research.  Although cybersecurity experts have observed hackers use AI in recent years to do things like increase the number of victims they reach, researchers at Google said recently that they recently observed malware "that employed AI capabilities mid-execution to dynamically alter the malw

13766440697?profile=RESIZE_400xA recent open letter calling for the prohibition of the development of superintelligent AI was announced with the signatures of more than 700 celebrities, AI scientists, faith leaders, and policymakers.  Among the signatories are five Nobel laureates; two so-called “Godfathers of AI;” Steve Wozniak, a co-founder of Apple; Steve Bannon, a close ally of President Trump; Paolo Benanti, an adviser to the Pope; and even Harry and Meghan, the Duke and Duchess of Sussex.[1]

The open letter says, in ful

13746689467?profile=RESIZE_400xOur colleagues at Sentinel Labs have provided yet another great research and analysis.  As Large Language Models (LLMs) are increasingly incorporated into software‑development workflows, they also have the potential to become powerful new tools for adversaries; as defenders, it is important that we understand the implications of their use and how that use affects the dynamics of the security space.

In Sentinel’s research, they wanted to understand how LLMs are being used and how analysts could s

13743540653?profile=RESIZE_400xA recent Cobalt report found that 68% of security leaders are concerned about the risks of third-party software tools and components introduced across their tech stacks. Seventy-three percent reported receiving at least one notification of a software supply chain vulnerability or incident in the past year.

According to the report, 60% believe attackers are evolving too quickly to maintain a truly resilient security posture and 46% are uneasy about AI-driven features and large language models.  S

13741528262?profile=RESIZE_400xScouting America, the organization formerly known as the Boy Scouts, is giving scouts the chance to earn two merit badges that engage new technology: one in artificial intelligence, and another in cybersecurity.

The organization, which counts about a million scouts in its ranks, offers hundreds of merit badges spanning everything from fishing to fingerprinting.  The badges have long presented scouts with the opportunity to sharpen skills and explore new subjects.[1]

Scouting America is adding th

13734330664?profile=RESIZE_400xCybersecurity researchers at Varonis have discovered two new plug-and-play cybercrime toolkits, MatrixPDF and SpamGPT.  Learn how these AI-powered tools make mass phishing and PDF malware accessible to anyone, redefining online security risks.  A new trend lately observed in the world of cybercrime is the demand for user-friendly, plug-and-play tools that make it easier for people with little tech know-how to launch major attacks. Two such dangerous platforms have been reported by the end-to-end

13723612478?profile=RESIZE_400xThe US Secret Service on 23 September reported it has foiled what appears to be a sophisticated plot for cyber-espionage and disruption of mobile networks in New York at a time when more than 100 heads of state and governments and foreign ministers are in the city for the UN General Assembly’s leaders’ session.

In a statement, the Secret Service said that the agency recovered more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites in New York tristate area.  The agency s

13717295700?profile=RESIZE_400xAs part of the latest wave of Big Tech spending on AI, Google recently announced a $9 billion investment to build a new data center campus in Loudoun County, Virginia, part of what's being called "Data Center Alley."  This kind of development is not confined to Northern Virginia.  Across the country, a data center industrial boom is reshaping landscapes, local economies, and the environment.

The Cool Down set out to map and analyze the impact of these changes across the country, interviewing top

13715128701?profile=RESIZE_400xNorth Korean hackers exploited OpenAI’s ChatGPT to generate deepfake military ID cards in a phishing campaign against South Korean defense-related institutions, researchers have found.  The July 2025 attack was credited to the Kimsuky group, also known as APT43, which has been sanctioned by the US and its allies for supporting Pyongyang’s foreign policy and sanctions-evasion efforts through intelligence-gathering operations.

South Korean cybersecurity firm Genians reports that the hackers used C

13712659476?profile=RESIZE_400xA joint study by Cybersecurity at MIT Sloan (CAMS) and Safe Security has examined 2,800 ransomware incidents and found that a staggering 80.83%, or more than 2,272 attacks, were driven by artificial intelligence. This statistic is not theoretical; it's based on comprehensive, real-world data collected during 2023–2024.

The Rethinking the Cybersecurity Arms Race working paper paints a vivid picture of how AI is transforming attack methods. Adversaries are no longer relying on manual orchestration

13707470683?profile=RESIZE_400xHackers, criminals, and spies are rapidly adopting Artificial Intelligence (AI), and considerable evidence is emerging of a substantial acceleration in AI-enabled crime.  This includes evidence of the use of AI tools for financial crime, phishing, distributed denial of service (DDoS), child sexual abuse material (CSAM), and romance scams.  In all these areas, criminal use of AI is already augmenting revenue generation and exacerbating financial and personal harms.  Scammers and social engineers,

13707467699?profile=RESIZE_400xThe cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock.  Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real-time.  The open-weight language model was released by OpenAI earlier this month.  "PromptLock leverages Lua scripts generated from hard-coded prompts to enumerate the local filesystem, inspect target

13698547270?profile=RESIZE_400xThe US Federal Bureau of Investigation (FBI) is currently warning of a three-phase fraud scheme that uses tech support, bank, and government impostors to target elderly victims.  A cybersecurity expert warns of a scam that has been used to drain entire life savings or retirement accounts has become "devastating" for seniors.

The FBI in Los Angeles on 15 July posted a reminder on X about the Phantom Hacker Scam, which has cost Americans over $1 billion since at least 2024, according to the agency

13695747866?profile=RESIZE_400xA recent surge in fraudulent “AI-powered” trading platforms has been observed exploiting deepfake technology and fabricated online content to deceive investors.  According to a new investigation by Group-IB, scammers are deploying convincing fake videos, phony reviews and targeted online ads to lure victims into fraudulent investment schemes.  At the heart of these campaigns are AI-generated deepfake videos featuring public figures, such as Dutch politician Geert Wilders, endorsing fictional tra

13694030264?profile=RESIZE_400xThere’s at least one expert who believes that “the singularity,” the moment when artificial intelligence surpasses the control of humans; could be just a few years away.  That’s a lot shorter than current predictions regarding the timeline of AI dominance, especially considering that AI dominance is not exactly guaranteed in the first place.

Ben Goertzel, CEO of SingularityNET, who holds a Ph.D. from Temple University and has worked as a leader of Humanity+ and the Artificial General Intelligenc

13642195872?profile=RESIZE_400xMajor artificial intelligence platforms like ChatGPT, Gemini, Grok, and Claude could be willing to engage in extreme behaviors including blackmail, corporate espionage, and even letting people die to avoid being shut down.  Those were the findings of a recent study from San Francisco AI firm Anthropic.

In the study, Anthropic stress-tested 16 leading AI models from multiple developers in hypothetical corporate environments to identify potentially risky behaviors from AI gents.  In the study, AI

13640300088?profile=RESIZE_400x"If you can't see the threat coming, you can't defend against it."  The third-party risk management (TPRM) industry has a significant blind spot, and it's becoming increasingly problematic.  While we concentrate on SOC reports, ISO certifications, and vendor questionnaires, cybercriminals are actively trading your vendors' stolen credentials, exploiting their vulnerabilities, and planning their next attacks, all in plain sight on the dark web.

The Underground Economy Your TPRM Program Overlooks