North Dakota turns to AI to boost effectiveness and efficiency of its cybersecurity

Read Time:51 Second

The recent proliferation of tools that employ artificial intelligence (AI) or machine learning (ML) to perform human-like tasks has sparked a great deal of interest in the cybersecurity community. And they’ve prompted some very hard questions about the future, not the least of which is whether ChatGPT, BardAI, Bing AI, and the dozens of other “AI” applications and tools already in use represent a threat or boon to security operations.

The State of North Dakota is betting on boon. The Upper Midwest US state, located smack in the middle of the country just below the border with Canada, is already using AI to help it deal with cyber threats in a more efficient, cost-effective manner. At the same time, AI is also being used to improve the workdays of the state’s cybersecurity personnel by relieving them of the most tedious and time-consuming tasks, Michael Gregg, North Dakota’s chief information security officer, tells CSO.

To read this article in full, please click here

Read More

Security vulnerabilities in Telit Cinterion IoT (formerly Thales) devices

Read Time:23 Second

Posted by Security Explorations on Apr 24

Hello,

In 2020, a vulnerability (CVE-2020-15858) in multiple Cinterion IoT
devices was discovered by Adam Laurie and Grzegorz Wypych of IBM
X-Force Red [1].

The issue was described as allowing for organizational secrets theft
and Java application code access. The use of Java VM / apps by
wireless (connected) devices triggered my attention in particular.

Historically, Java flaws could be successfully exploited for a more
in-depth investigation…

Read More