How should SMBs navigate the phishing minefield?

In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes phishing … Continue reading How should SMBs navigate the phishing minefield?

Multiple nation-state hackers infiltrate single aviation organization

A single aviation organization was infiltrated by the hackers using vulnerabilities on internet-facing devices.

The post Multiple nation-state hackers infiltrate single aviation organization appeared first on CyberScoop.

Continue reading Multiple nation-state hackers infiltrate single aviation organization

3 ways to strike the right balance with generative AI

To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. Implement role-based access control In the context of generative AI, having pro… Continue reading 3 ways to strike the right balance with generative AI

‘Five Eyes’ nations release technical details of Sandworm malware ‘Infamous Chisel’

Russia is pivoting from disruptive cyberattacks to more targeted operations aimed at giving it an advantage on the Ukrainian battlefield.

The post ‘Five Eyes’ nations release technical details of Sandworm malware ‘Infamous Chisel’ appeared first on CyberScoop.

Continue reading ‘Five Eyes’ nations release technical details of Sandworm malware ‘Infamous Chisel’

Ransomware dwell time hits new low

Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks during the first half of 2023, according to Sophos. In 2022, the median dwell tim… Continue reading Ransomware dwell time hits new low

Is there any increase to known security risks by mounting the EFI System Partition, on a Windows 10 PC?

Security risks, as in malware, attackers, or known vulnerabilities.
Threats while the ESP is mounted, or after unmounting. E.g. Could it open access routes for future attackers. I aim to avoid creating new issues in the process of checking… Continue reading Is there any increase to known security risks by mounting the EFI System Partition, on a Windows 10 PC?

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterma… Continue reading Cybercriminals turn to AI to bypass modern email security measures

Previously unknown hacking group targets Hong Kong organizations in supply chain cyberattack

The unknown and unattributed hackers compromised legitimate software in apparent focused attack, researchers said.

The post Previously unknown hacking group targets Hong Kong organizations in supply chain cyberattack appeared first on CyberScoop.

Continue reading Previously unknown hacking group targets Hong Kong organizations in supply chain cyberattack

Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say

The use of artificial intelligence for malign purposes is limited but growing and maturing in key ways, researchers with Google’s Mandiant said Thursday.

The post Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say appeared first on CyberScoop.

Continue reading Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say