Enterprises face significant losses from mobile fraud

A recent Enea survey highlights a worrying trend in enterprise security: Following ChatGPT’s launch, 76% of businesses are inadequately protected against rising AI-driven vishing and smishing threats. In this Help Net Security video, John Hughes,… Continue reading Enterprises face significant losses from mobile fraud

Geopolitical tensions escalate OT cyber attacks

In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomware … Continue reading Geopolitical tensions escalate OT cyber attacks

The next wave of mobile threats

According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a… Continue reading The next wave of mobile threats

Six-year old bug will likely live forever in Lenovo, Intel products

A report from Binarly finds that a silently patched bug in a popular web server will likely live on in several major end-of-life products.

The post Six-year old bug will likely live forever in Lenovo, Intel products appeared first on CyberScoop.

Continue reading Six-year old bug will likely live forever in Lenovo, Intel products

Supply chain attack sends shockwaves through open-source community

An operation to undermine the software utility XZ Utils has exposed the fragile human foundations on which the modern internet is built.

The post Supply chain attack sends shockwaves through open-source community appeared first on CyberScoop.

Continue reading Supply chain attack sends shockwaves through open-source community

Chinese hackers turn to AI to meddle in elections

Hacking groups linked to the Chinese government are increasingly turning to deepfakes and other forms of AI-generated content when seeking to interfere in foreign elections, according to new research from Microsoft published Thursday. Beijing’s influence campaigns still rely on old standbys, such as using fake social media and news accounts, to spread state-backed propaganda, inject […]

The post Chinese hackers turn to AI to meddle in elections appeared first on CyberScoop.

Continue reading Chinese hackers turn to AI to meddle in elections

Healthcare’s cyber resilience under siege as attacks multiply

In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in protecting patient data due to infrastructure limitations and the role of employe… Continue reading Healthcare’s cyber resilience under siege as attacks multiply

AI abuse and misinformation campaigns threaten financial institutions

Though generative AI offers financial firms remarkable business and cybersecurity utility, cyberthreats relating to GenAI in financial services are a consistent concern, according to FS-ISAC. Cybercriminals exploit AI for data exfiltration The cybersec… Continue reading AI abuse and misinformation campaigns threaten financial institutions

Plan to resuscitate beleaguered vulnerability database draws criticism 

The National Vulnerability Database has ceased some of its work, but some experts fear the formation of a consortium to address its problems lacks sufficient urgency.

The post Plan to resuscitate beleaguered vulnerability database draws criticism  appeared first on CyberScoop.

Continue reading Plan to resuscitate beleaguered vulnerability database draws criticism