Riding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber Threats

In nearly every segment of our lives, AI (artificial intelligence) now makes a significant impact: It can deliver better healthcare diagnoses and treatments; detect and reduce the risk of financial fraud; improve inventory management; and serve up the right recommendation for a streaming movie on Friday night. However, one can also make a strong case […]

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

Google has announced that it’s expanding its Vulnerability Rewards Program (VRP) to compensate researchers for finding attack scenarios tailored to generative artificial intelligence (AI) systems in an effort to bolster AI safety and security. “Generative AI raises new and different concerns than traditional digital security, such as the potential for unfair bias, model manipulation or […]

How to Use Advanced Network Intelligence Toolkit for Pentesting: badKarma

Searching vulnerabilities on the host (the host can be a website, web server, network device (router and others), end-user computer) begins with the collection of basic information. This information includes host detection, scanning their ports to search for open, definition of running services at these ports, defining service versions and finding vulnerabilities for these versions, […]

US Cyber Command Links ‘MuddyWater’ Hacking Group to Iranian Intelligence

The U.S. Cyber Command (USCYBERCOM) on Wednesday officially confirmed MuddyWater’s ties to the Iranian intelligence apparatus, while simultaneously detailing the various tools and tactics adopted by the espionage actor to burrow into victim networks. “MuddyWater has been seen using a variety of techniques to maintain access to victim networks,” USCYBERCOM’s Cyber National Mission Force (CNMF) […]

Fields of application of artificial intelligence

At present, it is difficult to find a field of work for people in which different mechanisms and machines are not used that facilitate human labor. Probably, soon the number of such units will increase significantly, and they will be used almost everywhere. And above all, hopes for a qualitative leap in their development are […]

Development of Corporate Applications Based on Artificial Intelligence

Technologies based on Artificial intelligence can be used in corporate management since the indisputable advantage of these technologies is the ability to analyze large amounts of data without significant resource costs. The ability to use AI technologies is especially relevant when the control object and its external environment contain complex processes and factors that significantly […]

How Artificial intelligence (AI) Stops Cybercriminals

Newer AI algorithms are extremely good at analyzing data traffic, access, and transfer, as well as detecting outliers or anomalies in data trends. Below are some of the ways AI can prevent and mitigate the damage caused by cybercrime.  The world faces an unprecedented threat in modern cybercrime. Sophisticated, globally-dispersed actors who are increasingly hard […]

FBI, CISA Uncover Tactics Employed by Russian Intelligence Hackers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), and the Federal Bureau of Investigation (FBI) on Monday published a new joint advisory as part of their latest attempts to expose the tactics, techniques, and procedures (TTPs) adopted by the Russian Foreign Intelligence Service (SVR) in its attacks targeting the U.S […]

Mastercard Opens New Center and Intelligence in Canada

New Vancouver Space Becomes One of Six Regional Mastercard Innovation Centers on Thursday unveiled a new computer hub situated in Vancouver, Canada at the restored Old Stock Exchange building where NuData is also based. It is one of six world centers of technology and will develop cyber solutions for the global ecosystem for payments. Certain […]

Aventura Pays No Security Vulnerabilities for Flogging Chinese Intelligence Devices on the US government 100%

Accusations of fraud were brought against Aventura Technologies and its owner following the suspected selling of monitoring equipment to the US Government with known security vulnerabilities. Based in Commack, New York, the company that sells services like vision cameras, CCTV and processing is key to Thursday’s criminal complaint. According to the United States Department of […]

RITA – Real Intelligence Threat Analytics

  RITA is an open source framework for network traffic analysis. The framework ingests Bro/Zeek Logs in TSV format, and currently supports the following major features: Beaconing Detection: Search for signs of beaconing behavior in and out of your network DNS Tunneling Detection Search for signs of DNS based covert channels Blacklist Checking: Query blacklists […]

Maryam – Open-source intelligence (OSINT) Framework

  Maryam is a full-featured open-source intelligence (OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion, provides a command-line environment for used forensic and open-source intelligence(OSINT). Maryam is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module […]

OWASP Maryam – Framework for Open-Source Intelligence

Maryam is a full-featured open-source intelligence(OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion, provides a command-line environment for used forensic and open-source intelligence(OSINT). Maryam is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a […]

Intel Introduces ‘Springhill’ – Its First Artificial Intelligence Chip

At HotChips 2019, Intel was all about AI and one of the major announcements at the event was its first artificial intelligence chip ‘Springhill‘. The processor has been designed for large data centers and is based on the company’s 10nm process technology. The official name of the chip is NN-I and is developed at Intel’s […]

OpenCTI – Open Cyber Threat Intelligence Platform

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize technical and non-technical information about cyber threats. The structuration of the data is performed using a knowledge schema based on the STIX2 standards. It has been […]

Hackers Stole 7.5TB Of Secret Data From Russia’s Intelligence Agency

It appears that the hackers got hacked this time! According to BBC Russia, hackers have managed to steal data from Russia’s Federal Security Service (FSB). The attackers managed to steal about 7.5 terabytes of data from a major FSB contractor, thus exposing the secret projects the agency was working on to de-anonymize Tor browsing, scrape […]

Russia’s Secret Intelligence Agency Hacked – 7.5 Terabytes of Data Extracted

Hackers compromised the Russian Federal Security Service (FSB) servers where they gained access to 7.5 terabytes of data from a major FSB contractor named “Sytech”. Intruders leaked the dozens of data that related to non-public Internet projects such as how Russia trying to de-anonymization of users of the Tor browser, collecting information about users of […]

Russia’s Secret Intelligence Agency Hacked – One of the Largest Hack in the Russian Secret Service History

Hackers compromised the Russian Federal Security Service (FSB) servers where they gained access to 7.5 terabytes of data from a major FSB contractor named “Sytech”. Intruders leaked the dozens of data that related to non-public Internet projects such as how Russia trying to de-anonymization of users of the Tor browser, collecting information about users of social networks, […]