Tag: detection methods

  • Hacker News: When machines could see you

    Source URL: https://dnlserrano.github.io//2024/10/20/when-machines-could-see-you.html Source: Hacker News Title: When machines could see you Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details the historical development of facial recognition technologies, particularly highlighting the contributions of Geoffrey Hinton and the Viola-Jones algorithm. It emphasizes the transition from earlier methods used for face detection to modern…

  • The Register: Pixel perfect Ghostpulse malware loader hides inside PNG image files

    Source URL: https://www.theregister.com/2024/10/22/ghostpulse_malware_loader_png/ Source: The Register Title: Pixel perfect Ghostpulse malware loader hides inside PNG image files Feedly Summary: Miscreants combine it with an equally tricky piece of social engineering The Ghostpulse malware strain now retrieves its main payload via a PNG image file’s pixels. This development, security experts say, is “one of the most…

  • Cisco Security Blog: Using Artificial Intelligence to Catch Sneaky Images in Email

    Source URL: https://feedpress.me/link/23535/16856100/using-artificial-intelligence-to-catch-sneaky-images-in-email Source: Cisco Security Blog Title: Using Artificial Intelligence to Catch Sneaky Images in Email Feedly Summary: Image-based fraud in email can be challenging to detect and prevent. By leveraging AI, security teams can make inboxes more secure. AI Summary and Description: Yes Summary: The text discusses the challenges of detecting and preventing…

  • Cloud Blog: Staying a Step Ahead: Mitigating the DPRK IT Worker Threat

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat/ Source: Cloud Blog Title: Staying a Step Ahead: Mitigating the DPRK IT Worker Threat Feedly Summary: Written by: Codi Starks, Michael Barnhart, Taylor Long, Mike Lombardi, Joseph Pisano, Alice Revelli Strategic Overview of IT Workers Since 2022, Mandiant has tracked and reported on IT workers operating on behalf of the Democratic People’s…