The straight and narrow — How to keep ML and AI training on track

Artificial intelligence (AI) and machine learning (ML) have entered the enterprise environment. According to the IBM AI in Action 2024 Report, two broad groups are onboarding AI: Leaders and learners. Leaders are seeing quantifiable results, with two-thirds reporting 25% (or greater) boosts to revenue growth. Learners, meanwhile, say they’re following an AI roadmap (72%), but […]

The post The straight and narrow — How to keep ML and AI training on track appeared first on Security Intelligence.

Continue reading The straight and narrow — How to keep ML and AI training on track

AI decision-making: Where do businesses draw the line?

“A computer can never be held accountable, therefore a computer must never make a management decision.” – IBM Training Manual, 1979 Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using […]

The post AI decision-making: Where do businesses draw the line? appeared first on Security Intelligence.

Continue reading AI decision-making: Where do businesses draw the line?

Router reality check: 86% of default passwords have never been changed

Misconfigurations remain a popular compromise point — and routers are leading the way. According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing […]

The post Router reality check: 86% of default passwords have never been changed appeared first on Security Intelligence.

Continue reading Router reality check: 86% of default passwords have never been changed

Security roundup: Top AI stories in 2024

2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks. With the AI landscape rapidly evolving, it’s worth looking back before moving forward. Here are our top five AI security stories for 2024. Can you hear […]

The post Security roundup: Top AI stories in 2024 appeared first on Security Intelligence.

Continue reading Security roundup: Top AI stories in 2024

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities.” These actors pose a critical threat to United States infrastructure and protected data, and […]

The post Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity appeared first on Security Intelligence.

Continue reading Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

SpyAgent malware targets crypto wallets by stealing screenshots

A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices. Here’s how to dodge the bullet. Attackers shooting their (screen) shot Attacks start — as always […]

The post SpyAgent malware targets crypto wallets by stealing screenshots appeared first on Security Intelligence.

Continue reading SpyAgent malware targets crypto wallets by stealing screenshots

Risk, reward and reality: Has enterprise perception of the public cloud changed?

Public clouds now form the bulk of enterprise IT environments. According to 2024 Statista data, 73% of enterprises use a hybrid cloud model, 14% use multiple public clouds and 10% use a single public cloud solution. Multiple and single private clouds make up the remaining 3%. With enterprises historically reticent to adopt public clouds, adoption […]

The post Risk, reward and reality: Has enterprise perception of the public cloud changed? appeared first on Security Intelligence.

Continue reading Risk, reward and reality: Has enterprise perception of the public cloud changed?

Spooky action: Phantom domains create hijackable hyperlinks

According to a recent paper published at the 2024 Web Conference, so-called “phantom domains” make it possible for malicious actors to hijack hyperlinks and exploit users’ trust in familiar websites. The research defines phantom domains as active links to dot-com domains that have never been registered. Here’s what enterprises need to know about how phantom domains […]

The post Spooky action: Phantom domains create hijackable hyperlinks appeared first on Security Intelligence.

Continue reading Spooky action: Phantom domains create hijackable hyperlinks

Ransomware on the rise: Healthcare industry attack trends 2024

According to the IBM Cost of a Data Breach Report 2024, the global average cost of a data breach reached $4.88 million this year, a 10% increase over 2023. For the healthcare industry, the report offers both good and bad news. The good news is that average data breach costs fell by 10.6% this year. […]

The post Ransomware on the rise: Healthcare industry attack trends 2024 appeared first on Security Intelligence.

Continue reading Ransomware on the rise: Healthcare industry attack trends 2024

CVE backlog update: The NVD struggles as attackers change tactics

In February, the number of vulnerabilities processed and enriched by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) started to slow. By May, 93.4% of new vulnerabilities and 50.8% of known exploited vulnerabilities were still waiting on analysis, according to research from VulnCheck. Three months later, the problem persists. While NIST […]

The post CVE backlog update: The NVD struggles as attackers change tactics appeared first on Security Intelligence.

Continue reading CVE backlog update: The NVD struggles as attackers change tactics