LATEST CYBER SECURITY NEWS AND VIEWS

Home > News

Exploring Chat Injection Attacks in AI Systems

Posted on

Introduction to AI Chat Systems What are they? AI powered chat systems, often referred to as chatbots or conversational AI, are computer programs that are designed to simulate human conversation and interaction using artificial intelligence (AI). They can understand and respond to text or voice input from users and it make it seem like you […]

Read full post

CrowdStrike Incident and Recovery Steps

Posted on

The recent Crowdstrike incident has caused significant disruptions across the internet, leading to widespread outages. This issue affects windows users worldwide after a CrowdStrike update was pushed, resulting in blue screen errors. The issue occurred due to a defect in a content update for Microsoft users within CrowdStrike. Manual Recovery Steps One of our consultants, […]

Read full post

How AI is Transforming Cyber Threat Detection and Prevention

Posted on

The number of global cyber-attacks is increasing each year at a rapid rate. According to a study by Cybersecurity Ventures, in 2023 a cyberattack took place every 39 seconds, or over 2,200 times per day. This is a 12.8% increase from 2022. Attackers are getting more sophisticated and are increasingly using AI tools to automate […]

Read full post

Data Pollution – Risks and Challenges in AI Datasets 

Posted on

AI has been a hot topic in the media lately and is influencing every sector as well as our daily lives without us realising just how much. There are various systems that are driven by AI, most notable being virtual assistants (Siri, Google Assistant, Alexa, etc.) but also in healthcare to detect diseases earlier, in […]

Read full post

The Dark Side of AI: How Cybercriminals Exploit Artificial Intelligence

Posted on

Cybercriminals and security professionals are in an AI arms race. As quickly as cybersecurity teams on the front lines utilise AI to speed up their response to real-time threats, criminals are using AI to automate and refine their attacks. Tools that generate images, or conversational AI, are improving their quality and accuracy at increasing speeds. […]

Read full post

The Evolution of Prompt Injection in AI Models

Posted on

With the ever-increasing adoption of AI models across the globe, both within organisations and personal use, for some, efficiency and performance are though the roof. However, with this new technology brings a peaked interest from the cyber security industry and the shared gospel of “how can I break this?” has been ringing in their ears […]

Read full post

Ethical Implications of Manipulating AI Inputs 

Posted on

In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. Immanuel Kant  Introduction   Over the past decade the term ‘Artificial Intelligence’ (AI) has made efforts to remove itself from a buzzword used in startup elevator pitches to expanding onto a […]

Read full post

Prism Infosec launches LuxisAI, its Cyber Security as a Service (CSaaS) platform

Posted on

Prism Infosec is excited to announce the launch of our Cyber Security as a Service (CSaaS) platform, LuxisAI. LuxisAI provides our customers with a fast, simple and effective platform from which to access our suite of expert-delivered cyber security services. Through LuxisAI, our customers can quickly engage with our services and gain immediate access to […]

Read full post

Breaking PDFs with Server-Side Shenanigans

Posted on

Breaking PDFs

Introduction Generating PDFs from user supplied content is very common functionality within modern day Web Applications. Be it producing a receipt for an online purchase or generating a report based on user supplied content collected by the web application. There is endless application for this functionality. Dynamic PDF generation holds significant potential for a wide […]

Read full post

Unveiling the Virtual Battlefield: A Journey into Game Hacking and Reverse Engineering

Posted on

In the ever-evolving realm of digital entertainment, where creativity converges with cutting-edge technology, a subversive art form emerges — game hacking. Beyond the pixels and polygons lies a labyrinth of code waiting to be deciphered, manipulated, and reimagined. This intriguing practice not only kindles the flames of curiosity but also serves as a pivotal gateway […]

Read full post

FILTER RESULTS

Latest tweets

Data #leakage is just one of numerous risks associated with #GenAI necessitating the use of an #AI #risk framework, as Phil Robinson explains via  @governance_and. #cybersecurity

We interview Phil Robinson, Principal Security Consultant and Founder at @prisminfosec, who shares his views on ethical hackers and the latest ransomware trends.

Sign up to our newsletter

  • Fields marked with an * are mandatory

  • This field is for validation purposes and should be left unchanged.