LLMs lower the barrier for entry into cybercrime

Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt chatbots or large language models (LLM) lower the barrier for entry to cybercr… Continue reading LLMs lower the barrier for entry into cybercrime

Current ransomware defenses efforts are not working

Despite some positive developments, the impact of ransomware attacks remains high, according to SpyCloud. Infostealer infections preceded 22% of ransomware events for North American and European ransomware victim companies in 2023 – with common infoste… Continue reading Current ransomware defenses efforts are not working

Despite rising insider risk costs, budgets are being wasted in the wrong places

The cost of an insider risk is the highest it’s ever been, as organizations spend more time than ever trying to contain insider incidents, according to DTEX Systems. The average annual cost of an insider risk has increased to $16.2 million – a 40… Continue reading Despite rising insider risk costs, budgets are being wasted in the wrong places

How the FBI Fights Back Against Worldwide Cyberattacks

In the worldwide battle against malicious cyberattacks, there is no organization more central to the fight than the Federal Bureau of Investigation (FBI). And recent years have proven that the bureau still has some surprises up its sleeve. In early May, the U.S. Department of Justice announced the conclusion of a U.S. government operation called […]

The post How the FBI Fights Back Against Worldwide Cyberattacks appeared first on Security Intelligence.

Continue reading How the FBI Fights Back Against Worldwide Cyberattacks

Attackers hit software firm Retool to get to crypto companies and assets

Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers to access and take over accounts of 27 cloud customers, all in the crypto industry. According to a CoinDes… Continue reading Attackers hit software firm Retool to get to crypto companies and assets

Great security training is a real challenge

All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, wh… Continue reading Great security training is a real challenge

Understanding the dangers of social engineering

Social engineering is a manipulative technique used by individuals or groups to deceive or manipulate others into divulging confidential or sensitive information, performing actions, or making decisions that are not in their best interest. It often inv… Continue reading Understanding the dangers of social engineering

North Korean hackers target security researchers with zero-day exploit

North Korean threat actors are once again attempting to compromise security researchers’ machines by employing a zero-day exploit. The warning comes from Google’s own security researchers Clement Lecigne and Maddie Stone, who detailed the l… Continue reading North Korean hackers target security researchers with zero-day exploit