News

CSO Online
csoonline.com > article > 4118563 > python-bibliotheken-fur-hugging-face-modelle-vergiftet.html

Python-Bibliotheken für Hugging-Face-Modelle vergiftet

Python-Bibliotheken für Hugging-Face-Modelle vergiftet3+ hour, 30+ min ago   (280+ words) Tristan Fincken ist Junior Editor f'r die B2B-Marken von Foundry. Thematisch befasst er sich mit einer Bandbreite von Themen, die von Cybersecurity bis aktuellen Tech-Highlights reicht. NeMo, Uni2TS und FlexTok, Python-Bibliotheken f'r K'nstliche Intelligenz (KI) und Machine Learning (ML), die in Hugging-Face-Modellen…...

CSO Online
csoonline.com > article > 4118270 > appguard-critiques-ai-hyped-defenses-expands-its-insider-release-for-its-next-generation-platform.html

AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform

AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform5+ day, 1+ hour ago   (312+ words) A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and move faster than any cyber stack can…...

CSO Online
csoonline.com > video > 4111719 > cso-executive-sessions-asean-the-human-firewall-retention-ai-readiness-and-women-in-cybersecurity.html

CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity

CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity1+ week, 13+ hour ago   (154+ words) CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity'csoonline.com CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity In this first CSO Executive Session ASEAN of 2026, I sat down with Mandy…...

CSO Online
csoonline.com > article > 4107605 > podcast-die-it-tops-und-flops-2025-2.html

Podcast: Die IT-Tops und -Flops 2025

Podcast: Die IT-Tops und -Flops 20254+ week, 10+ hour ago   (394+ words) Ein turbulentes Jahr 2025 neigt sich dem Ende zu. Es war gepr'gt von wirtschaftlicher Unsicherheit, geopolitischen Spannungen und dem ungebremsten Siegeszug der K'nstlichen Intelligenz. Grund genug f'r die Redaktion von Computerwoche, CIO und CSO, in der letzten TechTalk-Podcast-Folge des Jahres Bilanz…...

CSO Online
csoonline.com > article > 4108592 > human-in-the-loop-isnt-enough-new-attack-turns-ai-safeguards-into-exploits.html

Human-in-the-loop isn’t enough: New attack turns AI safeguards into exploits

Human-in-the-loop isn’t enough: New attack turns AI safeguards into exploits1+ mon, 1+ day ago   (538+ words) Human-in-the-loop (HITL) safeguards that AI agents rely on can be subverted, allowing attackers to weaponize them to run malicious code, new research from CheckMarx shows. HITL dialogs are a safety backstop (a final "are you sure?) that the agents run…...

CSO Online
csoonline.com > article > 4099360 > ai-automation-and-integration-the-foundation-for-cyber-protection-in-2026.html

AI, automation, and integration: The foundation for cyber protection in 2026

AI, automation, and integration: The foundation for cyber protection in 20261+ mon, 2+ week ago   (413+ words) Cyber protection grew more complex in 2025 as more threat actors turned to artificial intelligence (AI) to increase their speed, scale, and precision. These autonomous ransomware, phishing, and data exfiltration attacks outpaced legacy tools and exploited gaps between security and backup…...

CSO Online
csoonline.com > article > 4095215 > cso-in-eigener-sache-mit-smart-answers-zu-mehr-information.html

CSO in eigener Sache: Mit Smart Answers zu mehr Information

CSO in eigener Sache: Mit Smart Answers zu mehr Information1+ mon, 3+ week ago   (271+ words) Wie k'nnen CISOs ihre Karriere pushen? Welche Auswirkungen haben Ransomware-Angriffe auf Unternehmen? Wie l'uft die Kommunikation nach einem Cyberangriff ab? Diese und viele weitere Fragen beantworten wir Ihnen auf der Website der CSO "ber unser neues KI-Tool "Smart Answers. Bei…...

CSO Online
csoonline.com > article > 4086908 > from-detection-to-response-why-confidence-is-the-real-game-changer.html

From detection to response: Why confidence is the real game changer

From detection to response: Why confidence is the real game changer2+ mon, 4+ day ago   (333+ words) Cybersecurity often feels like a race where you don't know when the starting gun will fire. The moment a threat slips past the perimeter, the countdown begins. Every minute between "we detected something" and "we know what to do about…...

CSO Online
csoonline.com > article > 4087335 > whisper-leak-uses-a-side-channel-attack-to-eavesdrop-on-encrypted-ai-conversations.html

Whisper Leak uses a side channel attack to eavesdrop on encrypted AI conversations

Whisper Leak uses a side channel attack to eavesdrop on encrypted AI conversations2+ mon, 1+ week ago   (548+ words) Researchers at Microsoft have revealed a new side channel attack named Whisper Leak that can reveal the topic of encrypted conversations between users and language models, even without access to the underlying text. The discovery highlights a growing blind spot…...

CSO Online
csoonline.com > article > 4046511 > llms-easily-exploited-using-run-on-sentences-bad-grammar-image-scaling.html

LLMs easily exploited using run-on sentences, bad grammar, image scaling

LLMs easily exploited using run-on sentences, bad grammar, image scaling4+ mon, 3+ week ago   (1006+ words) A series of vulnerabilities recently revealed by several research labs indicate that, despite rigorous training, high benchmark scoring, and claims that artificial general intelligence (AGI) is right around the corner, large language models (LLMs) are still quite na've and easily…...