Advanced Computing in the Age of AI | Thursday, March 28, 2024

malware

AI-Based Cyber Defenses Secure Drones From Zero-Day Attacks

Vulnerable to hacking, drones are getting another layer of defense via an AI-based cybersecurity approach that promises to shield the flying edge devices from zero-day attacks. SparkCognition, an industrial ...Full Article

Cyber Defenses Get an AI Boost

Greater access to big data and HPC resources are enabling enterprise use of emerging AI tools and machine learning models to help protect corporate networks and secure enterprise applications. ...Full Article

Open Source Survey Reviews Project Security and Sustainability Issues

A Linux Foundation report on trends in open-source software development assesses the factors driving contributors while urging more incentives to secure code and sustain community-based projects. The document, "Report ...Full Article

Hackers Target Chip Makers

Another indication of the strategic importance of the foundational semiconductor industry is a recent surge in cyberattacks directed at global chip manufacturers. Security researchers in Taiwan reported earlier this ...Full Article

Russian Malware Targets Linux, US Warns

The Russians are coming, again, this time with new malware targeting Linux systems, according to a U.S. advisory issued this week. The FBI and the U.S. National Security Agency ...Full Article

‘Shadow IoT’ Undermining Network Security

The majority of Internet of Things transactions are unsecured, adding a new enterprise security threat as industrial and retail IoT traffic begins to ramp up. An enterprise IoT survey ...Full Article

Updated: Worm Hits Docker Containers

A crypto-jacking worm, so-called because it spreads in spurts among unsecured images on servers, is said to be the first detected using Docker application containers. Palo Alto Network’s (NYSE: ...Full Article

Malware Goes ‘Polymorphic’

Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security experts refer to this chameleon-like malware as “polymorphic code,” and one researcher ...Full Article

Hybrid Clouds Remain Unsecured as New Threats Emerge

The added layer of operational complexity associated with hybrid cloud deployments is only making it harder for security teams to ward off attacks—assuming cloud users have created those teams ...Full Article

Spectre, Meltdown Redux: Intel Chips Found Vulnerable to More Malware

A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has ...Full Article
Page 1 of 212
EnterpriseAI