article thumbnail

10 things to watch out for with open source gen AI

CIO Business Intelligence

Even if you don’t have the training data or programming chops, you can take your favorite open source model, tweak it, and release it under a new name. According to Stanford’s AI Index Report, released in April, 149 foundation models were released in 2023, two-thirds of them open source.

article thumbnail

BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks

Tech Republic Security

One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.

Tools 533
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DeepSeek and AI-Generated Malware Pose New Danger for Cybersecurity

SecureWorld News

A recent report from Tenable highlights how DeepSeek R1, an open-source AI model, can generate rudimentary malware, including keyloggers and ransomware. While the AI-generated malware required manual debugging to function properly, its mere existence signals an urgent need for security teams to adapt their defenses.

Malware 110
article thumbnail

How to scan your websites for malware with ISPProtect

Tech Republic Security

Websites should be scanned regularly for malware. The post How to scan your websites for malware with ISPProtect appeared first on TechRepublic. Jack Wallen shows you how to do this on Linux with the help of ISPProtect.

Malware 368
article thumbnail

Unknown threat actor targeting Juniper routers with backdoor: Report

Network World

The bad news: According to researchers at Lumen Technologys Black Lotus Labs, the unknown attacker can install a reverse shell on the local file system so they can control the router, steal data, or deploy more malware. The J-magic campaign marks the rare occasion of malware designed specifically for Junos OS, said the report.

Report 222
article thumbnail

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Tech Republic Security

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia.

Financial 528
article thumbnail

Open-source developers targeted in sophisticated malware attack

Network World

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.

Malware 150