To comply with the EU's General Data Protection Regulation, many companies have improved their privacy policies. A new AI tool called Claudette is being used to assess these policies to see if they are compliant with the regulation.
An old tactic is being used by cybercriminals to bypass Microsoft Office 365 (O365) filters for phishing emails. The technique, called ZeroFont, involves the manipulation of text font sizes to trick O365’s natural language processing.
Authorities arrested four suspected leaders of a large-scale business email compromise (BEC) ring that managed to siphon off more than EU 18 million from companies in France and Belgium.
While the GDPR will require businesses to comply with rules that will ultimately protect customer data, concerns have been raised regarding how it will tackle automation in data analytics as the market for artificial intelligence (AI) continues to grow.
Due to BEC’s evolving and treacherous nature, run-of-the-mill best practices and security solutions have become weak to withstand attacks. Find out how advanced solutions that utilize artificial intelligence and machine learning help in defending against BEC.
Because most malware threats come from software download events, Trend Micro subsequently developed a human-readable machine learning system that successfully classifies unknown files into either benign or malicious in nature.