Trojans in AI models
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
45 articles
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
We share our experience on the optimal use of AI models in the SOC of our Kaspersky MDR service.
AI has dozens of applications in cybersecurity. Which ones are the most effective?
Our developments, products, research, patents and expert teams harnessed for AI.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
The new AI function in Microsoft Windows has already been dubbed a “security nightmare” on the internet. What risks does it carry, and how to stay safe?
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
How to tell a real photo or video from a fake, and trace its provenance.
Kaspersky has been hosting the Cyber Security Weekend (CSW) in META for nine years, bridging the knowledge gap within cybersecurity by educating the audience in an informative manner.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, and the many add-ons to these without jeopardizing your digital security?
Cybersecurity trends to consider and new threats to protect against in 2024.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?