Generative Data Intelligence

Tag: Red Team

Google squashes AI teams together in push for fresh models

Google is consolidating the various teams working on generative AI under the DeepMind team in a bid to accelerate development of more capable systems. The...

Top News

Cobalt’s New Report Uncovers a Big Shift in Cybersecurity Strategy

PRESS RELEASESAN FRANCISCO, Feb. 14, 2024 /PRNewswire-PRWeb/ -- Cobalt, the pioneers of Pentest as a Service (PtaaS), empowering businesses to operate fearlessly and innovate securely, has today...

Disrupting malicious uses of AI by state-affiliated threat actors

Based on collaboration and information sharing with Microsoft, we disrupted five state-affiliated malicious actors: two China-affiliated threat actors known as Charcoal Typhoon and Salmon...

New US Government ‘Safety Consortium’ Seeks to ‘Police’ AI

The U.S. government announced a new consortium to support the development and deployment of what it calls “safe and trustworthy” generative AI as authorities...

Why Red Teams Can’t Answer Defenders’ Most Important Questions

COMMENTARYIn 1931, scientist and philosopher Alfred Korzybski wrote, "The map is not the territory." He meant that all models, like maps, leave out some...

5 Essential Insights from the ‘Microsoft Digital Defense Report 2023’

Since 2005, Microsoft has released annual security intelligence reports, now known as the "Microsoft Digital Defense Report," as a way to track evolving cybersecurity...

Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024

COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...

Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024

COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...

Establishing Reward Criteria for Reporting Bugs in AI Products

At Google, we maintain a Vulnerability Reward Program to honor cutting-edge external contributions addressing issues in Google-owned and Alphabet-subsidiary Web properties. To keep up...

All I Really Need to Know About Cyber Security, I Learned in Kindergarten – Fintech Singapore

by Dan Wiley, Chief Security Advisor, Check Point Software December 15, 2023 I’m often asked which of...

Meta launches Purple Llama for AI developers to test safety

Meta has launched Purple Llama – a project aimed at building open source tools to help developers assess and improve trust and safety in...

Rootkit Turns Kubernetes From Orchestration to Subversion

As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers'...

Proactive, Compliance-focused and Empowering SOCs’ Capabilities

HONG KONG, Nov 22, 2023 - (ACN Newswire) - CITIC Telecom International CPC Limited (CITIC Telecom CPC), a wholly-owned subsidiary of CITIC Telecom International...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?