Cost of a data breach: The healthcare industry

Cyberattacks grow every year in sophistication and frequency, and the cost of data breaches continues to rise with them. A new report by IBM and the Ponemon Institute, the 2024 Cost of Data Breach Study, details the financial impacts of attacks across multiple industries. The global average cost of a data breach reached an all-time […]

The post Cost of a data breach: The healthcare industry appeared first on Security Intelligence.

Continue reading Cost of a data breach: The healthcare industry

A decade of global cyberattacks, and where they left us

The cyberattack landscape has seen monumental shifts and enormous growth in the past decade or so. I spoke to Michelle Alvarez, X-Force Strategic Threat Analysis Manager at IBM, who told me that the most visible change in cybersecurity can be summed up in one word: scale. A decade ago, “’mega-breaches’ were relatively rare, but now […]

The post A decade of global cyberattacks, and where they left us appeared first on Security Intelligence.

Continue reading A decade of global cyberattacks, and where they left us

Researchers develop malicious AI ‘worm’ targeting generative AI systems

Researchers have created a new, never-seen-before kind of malware they call the “Morris II” worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988. The worm demonstrates the potential dangers of AI security threats and […]

The post Researchers develop malicious AI ‘worm’ targeting generative AI systems appeared first on Security Intelligence.

Continue reading Researchers develop malicious AI ‘worm’ targeting generative AI systems

How will the Merck settlement affect the insurance industry?

A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else? In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, […]

The post How will the Merck settlement affect the insurance industry? appeared first on Security Intelligence.

Continue reading How will the Merck settlement affect the insurance industry?

Why cybersecurity training isn’t working (and how to fix it)

Early to a meeting, an employee decides to check direct messages on their favorite social network. Uh, oh. A message from the social network’s security team says their account has been hacked. They’ll need to click on the link to reset their password. You know the rest of the story. The link goes to a […]

The post Why cybersecurity training isn’t working (and how to fix it) appeared first on Security Intelligence.

Continue reading Why cybersecurity training isn’t working (and how to fix it)

What to know about new generative AI tools for criminals

Large language model (LLM)-based generative AI chatbots like OpenAI’s ChatGPT took the world by storm this year. ChatGPT became mainstream by making the power of artificial intelligence accessible to millions. The move inspired other companies (which had been working on comparable AI in labs for years) to introduce their own public LLM services, and thousands […]

The post What to know about new generative AI tools for criminals appeared first on Security Intelligence.

Continue reading What to know about new generative AI tools for criminals

How the FBI Fights Back Against Worldwide Cyberattacks

In the worldwide battle against malicious cyberattacks, there is no organization more central to the fight than the Federal Bureau of Investigation (FBI). And recent years have proven that the bureau still has some surprises up its sleeve. In early May, the U.S. Department of Justice announced the conclusion of a U.S. government operation called […]

The post How the FBI Fights Back Against Worldwide Cyberattacks appeared first on Security Intelligence.

Continue reading How the FBI Fights Back Against Worldwide Cyberattacks

Why consumer drones represent a special cybersecurity risk

Cybersecurity staff at an East Coast financial services company last summer detected unusual activity on its internal Atlassian Confluence page originating inside the company’s network. The MAC address used locally belonged to an employee known to be currently using the same MAC address remotely, according to a security specialist named Greg Linares, who had secondhand […]

The post Why consumer drones represent a special cybersecurity risk appeared first on Security Intelligence.

Continue reading Why consumer drones represent a special cybersecurity risk

How Do Some Companies Get Compromised Again and Again?

Hack me once, shame on thee. Hack me twice, shame on me. The popular email marketing company, MailChimp, suffered a data breach last year after cyberattackers exploited an internal company tool to gain access to customer accounts. The criminals were able to look at around 300 accounts and exfiltrate data on 102 customers. They also […]

The post How Do Some Companies Get Compromised Again and Again? appeared first on Security Intelligence.

Continue reading How Do Some Companies Get Compromised Again and Again?

Merging DevOps and SecOps is a Great Idea: Get Started Now

In the past, developers created the software, and security teams made it secure. But now, agile organizations are baking security into software from the very start. DevSecOps (development, security and operations) is a framework designed to automate security integration during the entire software development and deployment process. The DevSecOps concept is a necessary replacement for […]

The post Merging DevOps and SecOps is a Great Idea: Get Started Now appeared first on Security Intelligence.

Continue reading Merging DevOps and SecOps is a Great Idea: Get Started Now