How cyber criminals are compromising AI software supply chains

With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to […]

The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

Continue reading How cyber criminals are compromising AI software supply chains

NIST’s role in the global tech race against AI

Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology. However, recent […]

The post NIST’s role in the global tech race against AI appeared first on Security Intelligence.

Continue reading NIST’s role in the global tech race against AI

Cybersecurity trends: IBM’s predictions for 2024

From world events to the economy, 2023 was an unpredictable year. Cybersecurity didn’t stray far from this theme, delivering some unexpected twists. As organizations begin planning their security strategies for 2024, now is the time to look back on the year before and extrapolate what the future may hold. The year kicked off with Generative […]

The post Cybersecurity trends: IBM’s predictions for 2024 appeared first on Security Intelligence.

Continue reading Cybersecurity trends: IBM’s predictions for 2024

Locks, Stocks and Brokers: Hackers and Insider Trading

On February 14, 2023, a Russian national and owner of Moscow cybersecurity firm M-13 was found guilty of wire fraud, securities fraud and conspiracy to obtain unauthorized access to computers. Vladislav Klyushin was charged along with four other men — Ivan Yermakov, Nikolai Rumiantcev, Mikhail Irzak and Igor Sladkov. However, Klyushin was the only one […]

The post Locks, Stocks and Brokers: Hackers and Insider Trading appeared first on Security Intelligence.

Continue reading Locks, Stocks and Brokers: Hackers and Insider Trading

2022 Industry Threat Recap: Finance and Insurance

The finance and insurance sector proved a top target for cybersecurity threats in 2022. The IBM Security X-Force Threat Intelligence Index 2023 found this sector ranked as the second most attacked, with 18.9% of X-Force incident response cases. If, as Shakespeare tells us, past is prologue, this sector will likely remain a target in 2023. […]

The post 2022 Industry Threat Recap: Finance and Insurance appeared first on Security Intelligence.

Continue reading 2022 Industry Threat Recap: Finance and Insurance

The Role of Finance Departments in Cybersecurity

Consumers are becoming more aware of the data companies collect about them, and place high importance on data security and privacy. Though consumers aren’t aware of every data breach, they are justifiably concerned about what happens to the data companies collect.  A recent study of consumer views on data privacy and security revealed consumers are […]

The post The Role of Finance Departments in Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of Finance Departments in Cybersecurity

How Falling Crypto Prices Impacted Cyber Crime

Some rare good news in the world of cyber crime trends: Certain crimes declined in 2022 after years of constant rises. Should we credit crypto? Some estimates say that cryptocurrencies have lost $2 trillion in value since November 2021. During that time, the costs associated with cyber crimes, such as ransomware payouts and financial scams, […]

The post How Falling Crypto Prices Impacted Cyber Crime appeared first on Security Intelligence.

Continue reading How Falling Crypto Prices Impacted Cyber Crime

Avoid Being a Downstream Victim of Service Provider Attacks

Attacks on service providers are mounting — and so are downstream victims. Earlier this year, some customers of the cloud service provider DigitalOcean received emails instructing them to reset their passwords. These users hadn’t actually forgotten their passwords — their email addresses had been compromised in a data breach. But the cybersecurity incident didn’t start […]

The post Avoid Being a Downstream Victim of Service Provider Attacks appeared first on Security Intelligence.

Continue reading Avoid Being a Downstream Victim of Service Provider Attacks

Six Common Ways That Malware Strains Get Their Names

You’re likely familiar with the names of common malware strains such as MOUSEISLAND, Agent Tesla and TrickBot. But do you know how new malware threats get their names? As a cybersecurity writer, I quickly add new strains to my vocabulary. But I never knew how they came to have those names in the first place. […]

The post Six Common Ways That Malware Strains Get Their Names appeared first on Security Intelligence.

Continue reading Six Common Ways That Malware Strains Get Their Names

What CISOs Should Know About Hacking in 2023

The art of cyber crime is in a constant state of flux and evolution. Simply staying on pace with these trends is a significant part of the CISO’s job. Today’s modern CISO must ensure they are always prepared for the next big trend and remain ahead of adversaries. As we begin to navigate 2023, the […]

The post What CISOs Should Know About Hacking in 2023 appeared first on Security Intelligence.

Continue reading What CISOs Should Know About Hacking in 2023