Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers

Research has found that criminals can demand higher ransom when they compromise an organisation’s backup data in a ransomware attack. Discover advice from security experts on how to properly protect your backup. Continue reading Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers

Strengthening defenses against nation-state and for-profit cyber attacks

There is an urgent need to secure tactical, operational, and strategic critical assets from the edge to the core. In this Help Net Security video, Geoffrey Mattson, CEO of Xage Security, discusses the steps enterprises and critical infrastructure must … Continue reading Strengthening defenses against nation-state and for-profit cyber attacks

Cyber attacks on critical infrastructure show advanced tactics and new capabilities

In this Help Net Security interview, Marty Edwards, Deputy CTO OT/IoT at Tenable, discusses the impact of geopolitical tensions on cyber attacks targeting critical infrastructure. Edwards highlights the need for collaborative efforts between policymake… Continue reading Cyber attacks on critical infrastructure show advanced tactics and new capabilities

How to design and deliver an effective cybersecurity exercise

Armed forces have always utilized war-gaming exercises for battlefield training to prepare for times of conflict. With today’s digital transformation, the same concept is being applied in the form of cybersecurity exercises – tests and simulations base… Continue reading How to design and deliver an effective cybersecurity exercise

How AI can be hacked with prompt injection: NIST report

The National Institute of Standards and Technology (NIST) closely observes the AI lifecycle, and for good reason. As AI proliferates, so does the discovery and exploitation of AI cybersecurity vulnerabilities. Prompt injection is one such vulnerability that specifically attacks generative AI. In Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations, NIST defines […]

The post How AI can be hacked with prompt injection: NIST report appeared first on Security Intelligence.

Continue reading How AI can be hacked with prompt injection: NIST report

How teams can improve incident recovery time to minimize damages

With breach recovery costs skyrocketing, speeding time to recovery to minimize downtime and losses should be top of mind for security leaders. Yet, most focus on adding more prevention and detection tools. In this Help Net Security video, Nick Scozzaro… Continue reading How teams can improve incident recovery time to minimize damages

Microsoft and OpenAI Adopt AI-Driven Strategy to Counter Nation-State Cyber Threats

Microsoft’s latest Cyber Signals 2024 report reveals the alarming trend of nation-state threat actors harnessing generative AI for malicious purposes. Microsoft has also outlined its proactive measures in deploying AI-powered defenses to tackle the ever-evolving threat landscape. Microsoft Threat Intelligence team has reported that over 300 threat actors are currently using AI and Language Model…

The post Microsoft and OpenAI Adopt AI-Driven Strategy to Counter Nation-State Cyber Threats appeared first on Petri IT Knowledgebase.

Continue reading Microsoft and OpenAI Adopt AI-Driven Strategy to Counter Nation-State Cyber Threats

Rise in cyberwarfare tactics fueled by geopolitical tensions

In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides intelligence-derived trends, expertise, and recommendations on threat actors to help in… Continue reading Rise in cyberwarfare tactics fueled by geopolitical tensions

Integrating cybersecurity into vehicle design and manufacturing

In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly focusing on electric and connected vehicles. Edan highlights the challenges of technological advancements … Continue reading Integrating cybersecurity into vehicle design and manufacturing

Hacking the flow: The consequences of compromised water systems

In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disr… Continue reading Hacking the flow: The consequences of compromised water systems