{"id":860239,"date":"2024-09-26T09:58:32","date_gmt":"2024-09-26T04:28:32","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=860239"},"modified":"2024-09-26T09:58:32","modified_gmt":"2024-09-26T04:28:32","slug":"fears-realised-gen-ai-being-used-to-create-malware-confirms-hp-security-report","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/09\/26\/fears-realised-gen-ai-being-used-to-create-malware-confirms-hp-security-report\/","title":{"rendered":"Fears realised? Gen AI being used to create malware, confirms HP security report"},"content":{"rendered":"<p>An ever-improving generative artificial intelligence (AI) is all fun and games till it isn\u2019t. Deepfakes and realistic looking morphed content are problems the world is grappling with, and we can add online security threats to that. HP Inc., in their latest Threats Insights Report released at the company\u2019s annual HP Imagine keynote, suggests generative AI is being deployed to help write malicious code. HP\u2019s threat research team detected an instance of this\u2014what they call a large and refined ChromeLoader campaign spread through \u2018malvertising\u2019 that leads to professional-looking rogue PDF tools. They also logged instances of cybercriminals embedding malicious code in SVG images.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An ever-improving generative artificial intelligence (AI) is all fun and games till it isn\u2019t. Deepfakes and realistic looking morphed content are problems the world is grappling with, and we can add online security threats to that. HP Inc., in their latest Threats Insights Report released at the company\u2019s annual HP Imagine keynote, suggests generative AI is being deployed to help write malicious code. HP\u2019s threat research team detected an instance of this\u2014what they call a large and refined ChromeLoader campaign spread through \u2018malvertising\u2019 that leads to professional-looking rogue PDF tools. They also logged instances of cybercriminals embedding malicious code in [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,51,4],"tags":[],"class_list":["post-860239","post","type-post","status-publish","format-standard","hentry","category-hindustantimes","category-it-2-hindustantimes","category-newspapers"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/860239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=860239"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/860239\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=860239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=860239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=860239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}