Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LLM Risks: Chaining Prompt Injection with Excessive Agency

Alongside an explosion in the popularity of large language models (LLMs) across many industries, there has also been an increase in the level of trust granted to these models. Whereas LLMs were once perceived as simple, friendly chatbots that could respond to basic questions or pull useful resources from the web based on user input, many have now been granted the ability to perform actions, anywhere from sending an email to deploying code. This is referred to as agency.

The Age of AI-Powered Scams | The 443 Podcast

This week on the podcast, Marc Laliberte and Corey Nachreiner dive into a research white paper that explores how attackers could use AI to execute a full-scale money or credential theft scam from start to finish. Before that, they discuss Sophos's five-year battle with Chinese hackers targeting network devices, followed by a conversation about Microsoft’s ongoing fight against password spray attacks through compromised network devices.

How to Augment Creative With AI: Using RAG for Generative Art and Design

In the rapidly advancing field of artificial intelligence, innovative techniques like Retrieval Augmented Generation (RAG) are revolutionizing how AI systems generate content. RAG, a powerful approach that combines knowledge retrieval with language generation, has the potential to transform various domains, including generative art and design. This article explores how RAG can augment creativity in AI, focusing on its applications in generative art and design.

AI-Driven Cloud Detection Engineering: Turning Security Telemetry Into Action

Amal Mammadov is a cloud security practitioner and detection engineering specialist whose work sits at the intersection of threat intelligence, cloud-native architecture, and security operations. In this interview, he outlines why most organisations are losing ground despite heavy security investments and what it actually takes to build detection programmes that produce outcomes.

Chatbot, copilot or agent? A quick guide to enterprise AI tools, including Tines Workbench

As AI continues to mature, we’re beginning to see AI-powered capabilities fall into distinct categories that serve different functions across the enterprise. From help tools like copilots that assist users, to conversational bots providing AI-driven chat support, and efficiency-focused agents that automate complex tasks, these categories reveal the unique ways AI is transforming business operations.

The Difference Between Cybersecurity AI and Machine Learning

In what feels like 10 minutes, cybersecurity AI and machine learning (ML) have gone from a concept pioneered by a handful of companies, including SenseOn, to a technology that is seemingly everywhere. In a recent SenseOn survey, over 80% of IT teams told us they think that tools that use AI would be the most impactful investment their security operations centre (SOC) could make.

Five worthy reads: How non-human identities are shaping the cybersecurity landscape

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week’s article elucidates what non-human identities are and why they are garnering attention today. Undoubtedly, today’s digital environment is burgeoning with technological advancements across various spheres, and cybersecurity is no exception. We are in an era where automation, cloud computing, and AI play a more critical role than humans.