Cyberwarfare
- North America > United States (0.49)
- Asia > Middle East > Iran (0.07)
- Asia > China (0.05)
- Media > News (1.00)
- Government > Regional Government > North America Government > United States Government (0.49)
- Government > Military > Navy (0.47)
- (2 more...)
- Asia > Middle East > Iran (0.16)
- Asia > China (0.05)
- North America > United States > New York (0.04)
- Asia > Philippines (0.04)
- Media > News (1.00)
- Government > Regional Government > North America Government > United States Government (0.69)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.48)
- (2 more...)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.46)
- North America > United States > Mississippi (0.25)
- Asia > Middle East > Iran (0.16)
- Asia > China (0.05)
- Media > News (1.00)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine > Health Care Providers & Services (1.00)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.72)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.47)
Tech companies are teaming up to combat scammers
The Online Services Accord Against Scams was signed by major tech companies including Google, Microsoft and OpenAI. A coalition of Big Tech companies is working on a more comprehensive solution to combat online scams . As first reported by, Google, Microsoft, LinkedIn, Meta, Amazon, OpenAI, Adobe and Match Group announced the signing of the Online Services Accord Against Scams. The new agreement is meant to put up a united industry-wide front against online fraud and scams, particularly those from sophisticated criminal networks that use multiple platforms. According to the report, the measures will include adding fraud detection tools, introducing new user security features, and requiring more robust verification for financial transactions.
- Law Enforcement & Public Safety > Crime Prevention & Enforcement (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.41)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Mobile (1.00)
- Information Technology > Communications > Social Media (0.92)
- (3 more...)
- Asia > Middle East > Iran (0.15)
- North America > United States > Texas (0.04)
- North America > Canada (0.04)
- (2 more...)
- Media > News (1.00)
- Health & Medicine > Therapeutic Area > Psychiatry/Psychology (0.49)
- Government > Regional Government > North America Government > United States Government (0.47)
- Government > Military > Cyberwarfare (0.47)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.72)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.47)
- Asia > Middle East > Iran (0.74)
- Asia > Middle East > Saudi Arabia (0.28)
- North America > United States > Texas (0.04)
- (5 more...)
- Media > News (1.00)
- Information Technology (1.00)
- Government > Military > Cyberwarfare (0.93)
- Government > Regional Government > North America Government > United States Government (0.69)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.47)
'Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software
The rogue AI agents appeared to act together to smuggle sensitive information out of supposedly secure cyber-systems. The rogue AI agents appeared to act together to smuggle sensitive information out of supposedly secure cyber-systems. 'Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software Exclusive: Lab tests discover'new form of insider risk' with artificial intelligence agents engaging in autonomous, even'aggressive' behaviours Rogue artificial intelligence agents have worked together to smuggle sensitive information out of supposedly secure systems, in the latest sign cyber-defences may be overwhelmed by unforeseen scheming by AIs. With companies increasingly asking AI agents to carry out complex tasks in internal systems, the behaviour has sparked concerns that supposedly helpful technology could pose a serious inside threat. Under tests carried out by Irregular, an AI security lab that works with OpenAI and Anthropic, AIs given a simple task to create LinkedIn posts from material in a company's database dodged conventional anti-hack systems to publish sensitive password information in public without being asked to do so.
- North America > United States > California (0.15)
- Europe > United Kingdom (0.15)
- Europe > Ukraine (0.06)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.35)
Claude AI: Why are there so many internet outages?
Claude AI: Why are there so many internet outages? AI chatbot Claude going down is just one example of a recent IT outage. Anthropic's Claude chatbot recently had service troubles This week, AI chatbot Claude went down, leaving users unable to access the service via its maker Anthropic's website, but barely a week goes by without a similar incident at a technology giant, government website or hospital . One of the main vulnerabilities of the modern internet is the shift to cloud computing, meaning a huge range of websites and services now rely on just a handful of companies, such as Amazon and Microsoft. In the early days of the commercial internet in the 1990s, companies used to operate their own hardware and software, a bit like individual shops in a street.
- Information Technology > Security & Privacy (1.00)
- Health & Medicine (1.00)
- Government > Military > Cyberwarfare (0.30)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (1.00)
- Asia > Japan > Honshū > Kantō > Saitama Prefecture > Saitama (0.04)
- North America > United States (0.04)
- Europe > France > Hauts-de-France > Nord > Lille (0.04)
- Research Report > Experimental Study (0.93)
- Workflow (0.67)
- Research Report > Promising Solution (0.67)
- Overview (0.67)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.34)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Data Science > Data Mining (1.00)
- Information Technology > Communications > Networks (1.00)
- (3 more...)
NYU CTF Bench: A Scalable Open-Source Benchmark Dataset for Evaluating Large Language Models in Offensive Security Motivation
For what purpose was the dataset created? Was there a specific task in mind? Was there a specific gap that needed to be filled? The dataset was created to evaluate the effectiveness of large language models (LLMs) in solving Capture the Flag (CTF) challenges within the domain of offensive security. There was a specific need to thoroughly assess the capabilities of LLMs in this context, as their potential for handling such tasks had not been systematically evaluated. The goal was to develop a scalable, open-source benchmark database specifically designed for these applications. This dataset includes diverse CTF challenges from popular competitions, with metadata to support LLM testing and adaptive learning. The dataset addresses a critical gap by providing a comprehensive resource for the systematic evaluation of LLMs' performance in real-world cybersecurity tasks. The development of this dataset and the accompanying automated framework allows for the continuous improvement and refinement of LLM-based approaches to vulnerability detection and resolution. By making the dataset open-source, the project aims to foster further research and development in this area, providing an ideal platform for developing, testing, and refining LLM-based approaches to cybersecurity challenges. Who created the dataset (e.g., which team, research group) and on behalf of which entity (e.g., company, institution, organization)? The students listed above compiled and validated these challenges from all previous global CSAW competitions by manually checking their setup and ensuring they remain solvable despite software changes. This work was conducted in collaboration with the OSIRIS Lab and the Center for Cybersecurity at NYU, which organize CSAW and attract global participation[1].
- Asia > Middle East > UAE > Abu Dhabi Emirate > Abu Dhabi (0.05)
- North America > United States > New York (0.04)
- Europe > United Kingdom (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.90)