Integrating cybersecurity into vehicle design and manufacturing

In this Help Net Security interview, Yaron Edan, CISO at REE Automotive, discusses the cybersecurity landscape of the automotive industry, mainly focusing on electric and connected vehicles. Edan highlights the challenges of technological advancements … Continue reading Integrating cybersecurity into vehicle design and manufacturing

Hacking the flow: The consequences of compromised water systems

In this Help Net Security video, Andy Thompson, Offensive Cybersecurity Research Evangelist at CyberArk, discusses the dire consequences of hacking water systems and why their cybersecurity must be prioritized. From contaminating water supplies to disr… Continue reading Hacking the flow: The consequences of compromised water systems

Paying ransoms is becoming a cost of doing business for many

Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with data recovery deficiencies compounding the problem, according to Cohesity. In fact, most companies have paid a ransom in the… Continue reading Paying ransoms is becoming a cost of doing business for many

NIS2 Directive raises stakes for security leaders

In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming to standardize cybersecurity practices across sectors. NIS2 mandates minimal cybersecu… Continue reading NIS2 Directive raises stakes for security leaders

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model. The conversation also covers the essential steps for a reactive cyb… Continue reading Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

Mapping attacks on generative AI to business impact

In recent months, we’ve seen government and business leaders put an increased focus on securing AI models. If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that technology is trusted and secure must be businesses’ top priority. While generative AI adoption is […]

The post Mapping attacks on generative AI to business impact appeared first on Security Intelligence.

Continue reading Mapping attacks on generative AI to business impact

AI expected to increase volume, impact of cyberattacks

All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s analysts say, and predict that AI “will almost certainly increase the volume and heighten the impact of c… Continue reading AI expected to increase volume, impact of cyberattacks

Organizations invest more in data protection but recover less

92% of organizations will increase 2024 data protection spend, to achieve cyber resilience amidst continued threats of ransomware and cyberattacks, according to Veeam Software. Respondents shared that cyberattacks remain the top cause of outages and th… Continue reading Organizations invest more in data protection but recover less

Why cyberattacks mustn’t be kept secret

No company is immune to cyberattacks, but when the inevitable happens, too many companies still try to maintain a wall of silence. In fact, over half of security professionals admit their organizations maintain a culture of security through obscurity, … Continue reading Why cyberattacks mustn’t be kept secret

Microsoft’s Corporate Email Accounts Breached in Russian Espionage Attacks – What You Need to Know

Last week, Microsoft disclosed that Russian state-sponsored hackers exploited a weak password to infiltrate its corporate network. The threat actor (dubbed Midnight Blizzard) gained unauthorized access to the email accounts of its senior executives and employees working in legal and cybersecurity teams. Microsoft detailed that the Russian hacking group (also known as Nobelium or APT29)…

The post Microsoft’s Corporate Email Accounts Breached in Russian Espionage Attacks – What You Need to Know appeared first on Petri IT Knowledgebase.

Continue reading Microsoft’s Corporate Email Accounts Breached in Russian Espionage Attacks – What You Need to Know