Strategies for combating AI-enhanced BEC attacks

In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of BEC scam… Continue reading Strategies for combating AI-enhanced BEC attacks

Strengthening defenses against nation-state and for-profit cyber attacks

There is an urgent need to secure tactical, operational, and strategic critical assets from the edge to the core. In this Help Net Security video, Geoffrey Mattson, CEO of Xage Security, discusses the steps enterprises and critical infrastructure must … Continue reading Strengthening defenses against nation-state and for-profit cyber attacks

How much does cloud-based identity expand your attack surface?

We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael Jordan once said, “Get the fundamentals down, and the level of everything you … Continue reading How much does cloud-based identity expand your attack surface?

Key MITRE ATT&CK techniques used by cyber attackers

While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&… Continue reading Key MITRE ATT&CK techniques used by cyber attackers

Securing the future: Addressing cybersecurity challenges in the education sector

In this Help Net Security video, Kory Daniels, CISO at Trustwave, shines a light on the impact the current threat environment can have for both universities and students. Key findings from a recent Trustwave report include: – 1.8 million devices … Continue reading Securing the future: Addressing cybersecurity challenges in the education sector

Using AI to reduce false positives in secrets scanners

As development environments grow more complex, applications increasingly communicate with many external services. When a software development project communicates with an external service, it utilizes a token or “secret” for authentication…. Continue reading Using AI to reduce false positives in secrets scanners

The old, not the new: Basic security issues still biggest threat to enterprises

In 2023, cybercriminals saw more opportunities to “log in” versus hack into corporate networks through valid accounts – making this tactic a preferred weapon for threat actors, according to IBM’s 2024 X-Force Threat Intelligence Index… Continue reading The old, not the new: Basic security issues still biggest threat to enterprises