Cyber AI Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cyberai/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Wed, 02 Oct 2024 07:27:45 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Cyber AI Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cyberai/ 32 32 GhostStrike – A Cyber Security Tool for Red Team to Evade Detection https://gbhackers.com/ghoststrike/ https://gbhackers.com/ghoststrike/#respond Wed, 02 Oct 2024 07:27:43 +0000 https://gbhackers.com/?p=112946 The need for advanced tools that can effectively simulate real-world threats is paramount. Enter GhostStrike, a sophisticated cybersecurity tool explicitly designed for Red Team operations. With its array of features aimed at evading detection and performing process hollowing on Windows systems, GhostStrike is setting new benchmarks in cybersecurity testing. Dynamic API Resolution and Obfuscation Techniques […]

The post GhostStrike – A Cyber Security Tool for Red Team to Evade Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/ghoststrike/feed/ 0
Creating An AI Honeypot To Engage With Attackers Sophisticatedly https://gbhackers.com/ai-honeypot-engagement/ https://gbhackers.com/ai-honeypot-engagement/#respond Tue, 17 Sep 2024 08:36:11 +0000 https://gbhackers.com/?p=111974 Honeypots, decoy systems, detect and analyze malicious activity by coming in various forms and can be deployed on cloud platforms to provide insights into attacker behavior, enhancing security. The study proposes to create an interactive honeypot system using a Large Language Model (LLM) to mimic Linux server behavior. By fine-tuning the LLM with a dataset […]

The post Creating An AI Honeypot To Engage With Attackers Sophisticatedly appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/ai-honeypot-engagement/feed/ 0
CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response https://gbhackers.com/cisa-conducts-first-ever-tabletop/ https://gbhackers.com/cisa-conducts-first-ever-tabletop/#respond Tue, 18 Jun 2024 08:14:42 +0000 https://gbhackers.com/?p=92005 On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by conducting the federal government’s inaugural tabletop exercise focused on artificial intelligence (AI) security incidents. This groundbreaking event, led by the Joint Cyber Defense Collaborative (JCDC), brought together key stakeholders from the private sector to address the unique challenges posed by AI […]

The post CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisa-conducts-first-ever-tabletop/feed/ 0
Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users https://gbhackers.com/sleepy-pickle-exploit-ml-models/ https://gbhackers.com/sleepy-pickle-exploit-ml-models/#respond Fri, 14 Jun 2024 11:35:36 +0000 https://gbhackers.com/?p=91908 Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or manipulate outcomes in their favor. By compromising the ML models, hackers can degrade the system performance, cause financial losses, and damage the trust and reliability of AI-driven applications. Cybersecurity analysts at Trail of […]

The post Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/sleepy-pickle-exploit-ml-models/feed/ 0
Phishing Attacks Rise By 58% As The Attackers Leverage AI Tools https://gbhackers.com/phishing-attacks-rise-ai-tools/ https://gbhackers.com/phishing-attacks-rise-ai-tools/#respond Wed, 24 Apr 2024 14:37:22 +0000 https://gbhackers.com/?p=88482 AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns. Protecting data and systems from this democratization of phishing abilities gives a new challenge for the defenders. Zscaler’s Phishing Report 2024 is based on an analysis of more than 2 billion phishing reports that occurred in 2023 and […]

The post Phishing Attacks Rise By 58% As The Attackers Leverage AI Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/phishing-attacks-rise-ai-tools/feed/ 0
NSA, CISA & FBI Released Best Practices For AI Security Deployment 2024 https://gbhackers.com/nsa-cisa-fbi-released-best-practices-for-ai-security-deployment/ https://gbhackers.com/nsa-cisa-fbi-released-best-practices-for-ai-security-deployment/#respond Tue, 16 Apr 2024 06:36:24 +0000 https://gbhackers.com/?p=87842 In a groundbreaking move, the U.S. Department of Defense has released a comprehensive guide for organizations deploying and operating AI systems designed and developed byanother firm. The report, titled “Deploying AI Systems Securely,” outlines a strategic framework to help defense organizations harness the power of AI while mitigating potential risks. The report was authored by […]

The post NSA, CISA & FBI Released Best Practices For AI Security Deployment 2024 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/nsa-cisa-fbi-released-best-practices-for-ai-security-deployment/feed/ 0
Zoom Unveils AI-Powered All-In-One AI Work Workplace https://gbhackers.com/zoom-unveils-ai-powered/ https://gbhackers.com/zoom-unveils-ai-powered/#respond Thu, 28 Mar 2024 13:45:35 +0000 https://gbhackers.com/?p=86465 Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered platform designed to redefine how we work. This innovative solution aims to streamline communication, enhance collaboration, and boost productivity. It addresses the challenges of dispersed teams and the overload of information that has become all too common in today’s work environment. […]

The post Zoom Unveils AI-Powered All-In-One AI Work Workplace appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/zoom-unveils-ai-powered/feed/ 0
Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers https://gbhackers.com/hackers-exploiting-ray-ai-framework/ https://gbhackers.com/hackers-exploiting-ray-ai-framework/#respond Wed, 27 Mar 2024 15:10:54 +0000 https://gbhackers.com/?p=86365 A critical vulnerability in Ray, an open-source AI framework that is widely utilized across various sectors, including education, cryptocurrency, and biopharma. This vulnerability, known as CVE-2023-48022, has been under active exploitation for the past seven months, allowing attackers to hijack computing power and leak sensitive data. The Discovery of CVE-2023-48022: ShadowRay Late in 2023, five […]

The post Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-exploiting-ray-ai-framework/feed/ 0
Hackers Selling GlorySprout Malware with Anti-VM Features in underground Fourm for $300 https://gbhackers.com/glorysprout-malware/ https://gbhackers.com/glorysprout-malware/#respond Wed, 20 Mar 2024 12:48:53 +0000 https://gbhackers.com/?p=85799 GlorySprout stealer, advertised on the XSS forum in early March 2024, is a C++ stealer sold for $300 with lifetime access and temporary payload encryption, that includes a loader, anti-CIS execution, and a non-functional grabber module.  Taurus Stealer, a C++ stealer with a Golang panel, emerged for sale on XSS in April 2020 and shared […]

The post Hackers Selling GlorySprout Malware with Anti-VM Features in underground Fourm for $300 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/glorysprout-malware/feed/ 0
DarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked Databases https://gbhackers.com/darkgpt/ https://gbhackers.com/darkgpt/#respond Mon, 18 Mar 2024 04:05:39 +0000 https://gbhackers.com/?p=85460 DarkGPT, your next-level OSINT (Open Source Intelligence) assistant. In this digital era, the ability to sift through vast amounts of data is invaluable, and DarkGPT, leveraging the power of GPT-4-200K, is designed to query leaked databases with precision. A Spanish pentester with a “luijait” alias on Github recently unveiled an AI OSINT tool dubbed “DarkGPT” that helps […]

The post DarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked Databases appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/darkgpt/feed/ 0