Okta breach: Hackers stole info on ALL customer support users

The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a report that contained the names and email addresses of all Okta customer suppor… Continue reading Okta breach: Hackers stole info on ALL customer support users

Building cyber resilience for tomorrow’s threats

Cyber resilience is the capacity of an organization to maintain its core functions and swiftly adapt to, respond to, and recover from cyber threats. A cyber-resilient organization recognizes that cyber threats are inevitable and constantly evolves its … Continue reading Building cyber resilience for tomorrow’s threats

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks. Continue reading Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

Could a threat actor socially engineer ChatGPT?

As the one-year anniversary of ChatGPT approaches, cybersecurity analysts are still exploring their options. One primary goal is to understand how generative AI can help solve security problems while also looking out for ways threat actors can use the technology. There is some thought that AI, specifically large language models (LLMs), will be the equalizer […]

The post Could a threat actor socially engineer ChatGPT? appeared first on Security Intelligence.

Continue reading Could a threat actor socially engineer ChatGPT?

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Microsoft exposes Octo Tempest, an English-speaking threat actor that runs extortion, encryption and destruction campaigns at a wide variety of industries. Protect your company from Octo Tempest with these tips. Continue reading Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Why cybersecurity training isn’t working (and how to fix it)

Early to a meeting, an employee decides to check direct messages on their favorite social network. Uh, oh. A message from the social network’s security team says their account has been hacked. They’ll need to click on the link to reset their password. You know the rest of the story. The link goes to a […]

The post Why cybersecurity training isn’t working (and how to fix it) appeared first on Security Intelligence.

Continue reading Why cybersecurity training isn’t working (and how to fix it)

AI vs. human deceit: Unravelling the new age of phishing tactics

Attackers seem to innovate nearly as fast as technology develops. Day by day, both technology and threats surge forward. Now, as we enter the AI era, machines not only mimic human behavior but also permeate nearly every facet of our lives. Yet, despite the mounting anxiety about AI’s implications, the full extent of its potential […]

The post AI vs. human deceit: Unravelling the new age of phishing tactics appeared first on Security Intelligence.

Continue reading AI vs. human deceit: Unravelling the new age of phishing tactics

F5 Warns Australian IT of Social Engineering Risk Escalation Due to Generative AI

F5 says an artificial intelligence war could start between generative AI-toting bad actors and enterprises guarding data with AI. Australian IT teams will be caught in the crossfire. Continue reading F5 Warns Australian IT of Social Engineering Risk Escalation Due to Generative AI

Cybersecurity pros predict rise of malicious AI

76% of cybersecurity professionals believe the world is very close to encountering malicious AI that can bypass most known cybersecurity measures, according to Enea. 26% see this happening within the next year, and 50% in the next 5 years. Worries abou… Continue reading Cybersecurity pros predict rise of malicious AI