Tag Archive for: race

AI drives silent arms race in security field | News


Artificial intelligence can provide a new frontline in the perpetual war between white-hat and black-hat hackers.

AI has the potential to be a game changer when it comes to digital security because of AI’s capability to detect threats, experts say. Its ability, thanks to algorithms and machine learning, to sift through an ocean of data to pinpoint and neutralize threats puts it far beyond human capability, perhaps offering an ever-alert, tireless sentinel safeguarding important digital fortresses.

“AI is akin to a double-edged sword. On the one hand, it’s the vigilant guardian of the digital realm,” Joseph Harisson, CEO of the Dallas-based IT Companies Network, said. “AI algorithms act like digital bloodhounds, sniffing out anomalies and threats with a precision that human analysts might miss.”

However, it’s that awesome power to quickly analyze large datasets that also makes AI a potent tool for criminals and other malicious actors.

“They use AI to craft more sophisticated cyberattacks, turning the hunter into the hunted,” Harisson said. “These AI-powered threats are like chameleons, constantly evolving to blend into their digital surroundings, making them harder to detect and thwart. It’s a perpetual cat-and-mouse game, with both sides leveraging AI to outmaneuver the other.”

Researchers are building computer networks that resemble the structure of the human brain, which leads to breakthroughs in AI research. This research isn’t just used to power cybersecurity, but enhance real-world security as well. Biometric research, such as fingerprints and facial recognition, helps law enforcement secure important sites like airports and government buildings. Security companies also use these technologies to secure their clients’ property. It’s even reached the home sector, with companies like Ring providing home security solutions.

Katerina Goseva-Popstojanova, professor at the Lane Department of Computer Science and Engineering at West Virginia University, said AI has been part of the…

Source…

Security Will Be ‘Like It’s New Year’s Eve’ For Vegas Race


(TNS) – Security will be tight for next week’s Las  Vegas Grand Prix on the Strip with multiple public service agencies, both local and federal, monitoring the international event.

Officials estimate 20,000 to 30,000 people will watch the 50-lap, 192.56-mile Formula One race from specially built grandstands that require the closure of parts of the heart of the Strip in the early evenings and mornings from Thursday through the overnight into Nov. 19. The race will start at 10 p.m. on Nov. 18.

“We’re planning for this like it’s New Year’s Eve,” Metropolitan Police Department Undersheriff Andrew Walsh said during a news conference Thursday. “I think that’s the best way to look at it. The number of visitors that will be here is comparable to that, so that’s what we’re planning for.”


But “the preparation for this epic event has been unlike anything that we have gone through before,” he said.

Heightened security

Metro police “will have a large presence both inside the track and outside the track” and have a liaison provided by the U.S. Department of Homeland Security “in case we need anything from our federal partners” to help with security, Walsh said.

“You’ll also see hundreds of private sector security folks working inside the track each night,” he said.

Safety screens will be installed on all private and public pedestrian bridges over the track and in and around the footprint of the race to control the flow of pedestrians and for driver safety so people can’t throw things onto the track below the bridges, Walsh said.

Traffic closures will be enforced on parts of Las Vegas Boulevard, Koval Lane, Harmon Avenue and Sands Avenue from Thursday to Nov. 18 beginning each day at 5 p.m. with a “hard closure” at 7 and the roads reopening at around 6 a.m. the next day, “contingent on how fast the crews can clear the circuits,” he said.

The Federal Aviation Administration has implemented a temporary “no drone zone” over the track area and those trying to fly drones, perhaps to get an overhead view of the event, face a $30,000 fine and possible criminal prosecution, Walsh said.

The…

Source…

Cyber Vendors or Cyber-Criminals: Who’s Winning the Race for the Brows


From the rollout of text-to-image generation tools like DALL-E to natural language processing platforms such as ChatGPT, wowing in their ability to write resumes, scientific papers and more, it has been a breakthrough 12 months for artificial intelligence (AI). 

Many industries are already embracing these advances. Market research, copywriting, time management, coding and customer service are all purposes for which ChatGPT, and its rival platforms, are being leveraged by businesses. However, it’s not just corporations tapping into AI’s potential.

With the emergence of ever more useful tools, threat actors have also become empowered to find and develop increasingly sophisticated threat campaigns designed to exploit common vulnerabilities facing enterprises in 2023.

At Menlo Security, we have seen a major uptick in the use of highly evasive attacks targeting the browser, in part driven by this increasingly easy access to AI tools that even amateur attackers can use to create malware or viruses.

It’s an adjustment that adversaries have made in response to the changing working norms. Where many organizations have continued to embrace remote and flexible policies post-Covid, employees are enjoying the freedom of working wherever, whenever and however it best suits them – be it from the office, at home or on the go, both within and outside of the traditional 9 to 5. 

To facilitate this, enterprises have embraced cloud-based models – a dynamic in which the browser has become the central hub of operations. In fact, Google reports that the average employee spends as much as 75% of their working day using a web browser. 

As threat actors have adapted, cultivating an increasingly expansive and sophisticated arsenal of browser-based attack methods in response, 80% of breaches are now estimated to come through the browser.

Adapting Security Strategies

The spike in browser-focused cyber-attacks is, of course, a problem and one that has seen a range of policies deployed to find a resolution. 

Recently, it was reported that Google is running a pilot scheme to encourage selected staff members (around 2500) to work without access to the internet, the…

Source…

Cybersecurity Best Practice Is Critical for Winning the New Space Race


As the low Earth orbit market prepares to double over the next
five years, to the tune of around $20 billion, we sit on the edge of a new
space race. However, amid rapidly falling launch costs and a host of
technological advancements, it’s safe to say that this race is heading into new
territory.

These digitizations relate to the role of sensors and data
processing, and a plethora of applications that aid ground control and
observation operations.

One segment of the race that is still yet to pick up speed,
however, relates to cybersecurity. The implications of attacks on satellites
are self-evident, but the resilience and protection of these galactical systems
require further exploration and a mass team effort.

Familiarity in Space

The difficulties that come with protecting devices in space comprize
multiple complex systems within systems — each playing different roles and
being deployed by different players.

Satellites are effectively just platforms with embedded systems
and interfaces, including radio communications, telemetry tracking control
systems, and ground segment connections. These are all essentially enterprise
networks, but that also makes them avenues of opportunity for
cybercriminals.

These systems are underpinned by a complex supply chain — another
prime target for attackers, as we’ve seen on the ground through examples like
SolarWinds, where the supply chain served as a gateway to all other interfaces.

Not only does this make systems in space more familiar than you
might think, it also makes them more challenging to defend.

As such, the satellite door is potentially being left ajar to
hacktivists, financial crusaders, and state-acting spies who can use their significant resources to target other countries’ prized
space assets.

The “How” and “Why” of Space Attacks

Why attack space when there are systems on land?

The answer is twofold, based on how familiar these satellite
platforms actually are, and what attackers stand to gain by infiltrating them.

Addressing the former, “under the hood” of a satellite
is a platform. More often than not, the embedded system within that platform
may be as recognizable as a Linux operating system. And while the operations…

Source…