Jun 13, 2024NewsroomVulnerability / Software Security The security risks posed by the Pickle format have once again come to the fore with the discovery of a new "hybrid machine learning (ML) model exploitation technique" dubbed Sleepy Pickle. The attack method, per Trail of Bits, weaponizes the ubiquitous format used to package and distribute machine learning (ML) models to … [Read more...] about New Attack Technique ‘Sleepy Pickle’ Targets Machine Learning Models
learning
Exploring 11 popular machine learning algorithms
Over the past few years, machine learning (ML) has quietly become an integral part of our daily lives. It impacts everything from personalized recommendations on shopping and streaming sites to protecting our inboxes from the onslaught of spam we get every day. But it’s not purely a tool for our convenience. Machine learning has become crucial in the current tech landscape, and … [Read more...] about Exploring 11 popular machine learning algorithms
Machine learning vs. AI: Understanding the differences
Despite the terms often being used interchangeably, machine learning and AI are separate and distinct concepts. As we’ve already mentioned, machine learning is a type of AI, but not all AI is, or uses, machine learning. Even though there is a large amount of overlap (more on that later), they often have different capabilities, objectives, and scope.The broader aim of AI is to … [Read more...] about Machine learning vs. AI: Understanding the differences
Identifying Data Exfiltration with Machine Learning
Jun 22, 2023The Hacker NewsNetwork Security / Machine Learning Why Data Exfiltration Detection is Paramount? The world is witnessing an exponential rise in ransomware and data theft employed to extort companies. At the same time, the industry faces numerous critical vulnerabilities in database software and company websites. This evolution paints a dire picture of data … [Read more...] about Identifying Data Exfiltration with Machine Learning
Why You Need AI and Machine Learning to Combat Hands-on-Keyboard Attacks
Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can predict and proactively protect against emerging threats by using behavioral event data. CrowdStrike’s artificial intelligence (AI)-powered indicators of attack (IOAs) use ML to detect … [Read more...] about Why You Need AI and Machine Learning to Combat Hands-on-Keyboard Attacks
Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can predict and proactively protect against emerging threats by using behavioral event data. CrowdStrike’s artificial intelligence (AI)-powered indicators of attack (IOAs) use ML to detect … [Read more...] about Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Automate Observability Tasks with Logz.io Machine Learning
As an observability provider, we are always confronted with our clients’ goal for faster resolution of problems and better overall performance of their systems. By working on large-scale projects at Logz.io, I see the same main challenge coming up for all: extracting valuable insights from huge volumes of data generated by modern systems and applications. With traditional … [Read more...] about Automate Observability Tasks with Logz.io Machine Learning
Introduction to custom machine learning models and maps
Introduction to custom machine learning models and mapsHow to use text-based datasets to build beautiful dashboards leveraging mapsEnglish简体中文한국어日本語FrançaisDeutschEspañolPortuguêsIn Elasticsearch 8.0, we introduced the ability to run custom machine learning models, such as the ones based on BERT (Bidirectional Encoder Representations from Transformers), to perform natural … [Read more...] about Introduction to custom machine learning models and maps
Debunking 4 Cybersecurity Myths About Machine Learning
Machine learning has infiltrated the world of security tooling over the last five years. That’s part of a broader shift in the overall software market, where seemingly every product is claiming to have some level of machine learning. You almost have to if you want your product to be considered a modern software solution.This is particularly true in the security industry, where … [Read more...] about Debunking 4 Cybersecurity Myths About Machine Learning
New Framework Released to Protect Machine Learning Systems From Adversarial Attacks
Microsoft, in collaboration with MITRE, IBM, NVIDIA, and Bosch, has released a new open framework that aims to help security analysts detect, respond to, and remediate adversarial attacks against machine learning (ML) systems. Called the Adversarial ML Threat Matrix, the initiative is an attempt to organize the different techniques employed by malicious adversaries in … [Read more...] about New Framework Released to Protect Machine Learning Systems From Adversarial Attacks