cybersecurity incident
ICE Rolls Facial Recognition Tools Out to Officers' Phones
WIRED published a shocking investigation this week based on records, including audio recordings, of hundreds of emergency calls from United States Immigration and Customs Enforcement (ICE) detention centers. The calls--which include reports of incidents of staff sexual assaults, suicide attempts, and head injuries--indicate a system inundated by life-threatening incidents, delayed treatment, and overcrowding. In a 6-3 decision on Friday, the US Supreme Court upheld a Texas porn ID law, finding that age verification for explicit sites is constitutional. In a dissent, Justice Elena Kagan warned that this determination ignores First Amendment precedent and will have privacy implications for adults. Looking at the US bombing of Iranian nuclear sites last weekend, President Donald Trump posted initial announcements of the strikes on the social Network Truth Social, which then began suffering intermittent outages.
- North America > United States > Texas (0.25)
- North America > United States > California > Santa Clara County > Palo Alto (0.05)
- Europe > Norway (0.05)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.71)
- Information Technology > Artificial Intelligence > Vision > Face Recognition (0.67)
Investigating cybersecurity incidents using large language models in latest-generation wireless networks
Legashev, Leonid, Zhigalov, Arthur
The purpose of research: Detection of cybersecurity incidents and analysis of decision support and assessment of the effectiveness of measures to counter information security threats based on modern generative models. The methods of research: Emulation of signal propagation data in MIMO systems, synthesis of adversarial examples, execution of adversarial attacks on machine learning models, fine tuning of large language models for detecting adversarial attacks, explainability of decisions on detecting cybersecurity incidents based on the prompts technique. Scientific novelty: A binary classification of data poisoning attacks was performed using large language models, and the possibility of using large language models for investigating cybersecurity incidents in the latest generation wireless networks was investigated. The result of research: Fine-tuning of large language models was performed on the prepared data of the emulated wireless network segment. Six large language models were compared for detecting adversarial attacks, and the capabilities of explaining decisions made by a large language model were investigated. The Gemma-7b model showed the best results according to the metrics Precision = 0.89, Recall = 0.89 and F1-Score = 0.89. Based on various explainability prompts, the Gemma-7b model notes inconsistencies in the compromised data under study, performs feature importance analysis and provides various recommendations for mitigating the consequences of adversarial attacks. Large language models integrated with binary classifiers of network threats have significant potential for practical application in the field of cybersecurity incident investigation, decision support and assessing the effectiveness of measures to counter information security threats.
- Europe > Russia > Volga Federal District > Orenburg Oblast > Orenburg (0.05)
- Asia > Russia (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.96)
A Review of Cybersecurity Incidents in the Food and Agriculture Sector
Kulkarni, Ajay, Wang, Yingjie, Gopinath, Munisamy, Sobien, Dan, Rahman, Abdul, Batarseh, Feras A.
The increasing utilization of emerging technologies in the Food & Agriculture (FA) sector has heightened the need for security to minimize cyber risks. Considering this aspect, this manuscript reviews disclosed and documented cybersecurity incidents in the FA sector. For this purpose, thirty cybersecurity incidents were identified, which took place between July 2011 and April 2023. The details of these incidents are reported from multiple sources such as: the private industry and flash notifications generated by the Federal Bureau of Investigation (FBI), internal reports from the affected organizations, and available media sources. Considering the available information, a brief description of the security threat, ransom amount, and impact on the organization are discussed for each incident. This review reports an increased frequency of cybersecurity threats to the FA sector. To minimize these cyber risks, popular cybersecurity frameworks and recent agriculture-specific cybersecurity solutions are also discussed. Further, the need for AI assurance in the FA sector is explained, and the Farmer-Centered AI (FCAI) framework is proposed. The main aim of the FCAI framework is to support farmers in decision-making for agricultural production, by incorporating AI assurance. Lastly, the effects of the reported cyber incidents on other critical infrastructures, food security, and the economy are noted, along with specifying the open issues for future development.
- Europe > United Kingdom (0.28)
- Europe > Italy (0.14)
- North America > Canada (0.14)
- (30 more...)
- Research Report (1.00)
- Overview (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
- Government > Military > Cyberwarfare (1.00)
- Food & Agriculture > Agriculture (1.00)
- North America > United States > California > Los Angeles County (0.26)
- North America > United States > Virginia > Fairfax County (0.06)
- North America > United States > Florida > Broward County (0.06)
- North America > United States > Connecticut > Hartford County > Hartford (0.06)
- Information Technology > Security & Privacy (1.00)
- Education (1.00)
- Health & Medicine > Therapeutic Area > Infections and Infectious Diseases (0.36)
- Health & Medicine > Therapeutic Area > Immunology (0.36)
Machines v. hackers: Cybersecurity's artificial intelligence future
According to industry estimates, the US needs about 200,000 more workers to fill current cybersecurity roles. Globally, the gap is five times higher – an estimated 1 million workers. The issue has become such a priority that President Obama made increasing the number of cybersecurity workers a key component of his multibillion-dollar Cybersecurity National Action Plan, which was introduced earlier this year. The White House said earlier this month it plans on boosting the federal cybersecurity workforce by 3,500 new hires by year's end. But as businesses compete for scarce cybersecurity talent and policymakers weigh remedies for the digital security worker shortage, the ground underneath the profession is shifting.
- North America > United States > Nevada > Clark County > Las Vegas (0.05)
- North America > United States > Maryland (0.05)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
- Government > Military > Cyberwarfare (1.00)
Machines v. hackers: Cybersecurity's artificial intelligence future
According to industry estimates, the US needs about 200,000 more workers to fill current cybersecurity roles. Globally, the gap is five times higher – an estimated 1 million workers. The issue has become such a priority that President Obama made increasing the number of cybersecurity workers a key component of his multibillion-dollar Cybersecurity National Action Plan, which was introduced earlier this year. The White House said earlier this month it plans on boosting the federal cybersecurity workforce by 3,500 new hires by year's end. But as businesses compete for scarce cybersecurity talent and policymakers weigh remedies for the digital security worker shortage, the ground underneath the profession is shifting.
- North America > United States > Nevada > Clark County > Las Vegas (0.05)
- North America > United States > Maryland (0.05)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
- Government > Military > Cyberwarfare (1.00)