Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. Continue reading Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Exploring the impact of generative AI in the 2024 presidential election

2024 is a presidential election year in the US. 2016 and 2020 both saw impressive increases in attempts to influence voters through crafty propaganda and social media campaigns run by bots and expert social engineers, along with attempts to influence t… Continue reading Exploring the impact of generative AI in the 2024 presidential election

Okta breach: Hackers stole info on ALL customer support users

The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a report that contained the names and email addresses of all Okta customer suppor… Continue reading Okta breach: Hackers stole info on ALL customer support users

Building cyber resilience for tomorrow’s threats

Cyber resilience is the capacity of an organization to maintain its core functions and swiftly adapt to, respond to, and recover from cyber threats. A cyber-resilient organization recognizes that cyber threats are inevitable and constantly evolves its … Continue reading Building cyber resilience for tomorrow’s threats

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks. Continue reading Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

Could a threat actor socially engineer ChatGPT?

As the one-year anniversary of ChatGPT approaches, cybersecurity analysts are still exploring their options. One primary goal is to understand how generative AI can help solve security problems while also looking out for ways threat actors can use the technology. There is some thought that AI, specifically large language models (LLMs), will be the equalizer […]

The post Could a threat actor socially engineer ChatGPT? appeared first on Security Intelligence.

Continue reading Could a threat actor socially engineer ChatGPT?

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Microsoft exposes Octo Tempest, an English-speaking threat actor that runs extortion, encryption and destruction campaigns at a wide variety of industries. Protect your company from Octo Tempest with these tips. Continue reading Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Why cybersecurity training isn’t working (and how to fix it)

Early to a meeting, an employee decides to check direct messages on their favorite social network. Uh, oh. A message from the social network’s security team says their account has been hacked. They’ll need to click on the link to reset their password. You know the rest of the story. The link goes to a […]

The post Why cybersecurity training isn’t working (and how to fix it) appeared first on Security Intelligence.

Continue reading Why cybersecurity training isn’t working (and how to fix it)