Advertisements


Flipping the BEC funnel: Phishing in the age of GenAI

For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out to thousands of recipients in the hope that a few might take the bait. Over time, however, as s.....»»

Category: securitySource:  netsecurityJan 15th, 2024

AI risks under the auditor’s lens more than ever

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialis.....»»

Category: SSSSSSource:  Related News

AI risks under the auditor’s lens more than ever

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialis.....»»

Category: SSSSSSource:  Related News

AI risks under the auditor’s lens more than ever

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialis.....»»

Category: SSSSSSource:  Related News

Veriato introduces AI-driven predictive behavior analytics platform

Veriato released their next generation Insider Risk Management (IRM) solution. With organizations of all sizes facing a more complex cybersecurity environment, Veriato IRM delivers flexibility and scalability using the power of GenAI. Veriato’s IRM.....»»

Category: securitySource:  netsecurityRelated NewsApr 8th, 2024

Cybercriminal adoption of browser fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browser.....»»

Category: securitySource:  netsecurityRelated NewsApr 5th, 2024

22% of employees admit to breaching company rules with GenAI

Disruptive technologies like AI are heightening the longstanding tension between organizational security and employee productivity, according to 1Password. Employees are under increasing pressure to perform; to boost efficiency they’re embracing ge.....»»

Category: securitySource:  netsecurityRelated NewsApr 5th, 2024

Security pros are cautiously optimistic about AI

55% of organizations plan to adopt GenAI solutions within this year, signaling a substantial surge in GenAI integration, according to a Cloud Security Alliance and Google Cloud survey. The survey received 2,486 responses from IT and security professi.....»»

Category: securitySource:  netsecurityRelated NewsApr 5th, 2024

AI abuse and misinformation campaigns threaten financial institutions

Though generative AI offers financial firms remarkable business and cybersecurity utility, cyberthreats relating to GenAI in financial services are a consistent concern, according to FS-ISAC. Cybercriminals exploit AI for data exfiltration The cybers.....»»

Category: securitySource:  netsecurityRelated NewsMar 29th, 2024

Enterprises increasingly block AI transactions over security concerns

Enterprises must secure a transformation driven by generative AI (GenAI) bidirectionally: by securely adopting GenAI tools in the enterprise with zero trust while leveraging it to defend against the new AI-driven threat landscape, according to Zscale.....»»

Category: securitySource:  netsecurityRelated NewsMar 28th, 2024

Apple users targeted by sophisticated phishing attack to reset their ID password

There are many known phishing attacks that target users of Apple devices to gain access to their Apple ID. However, a new “elaborate” attack uses a bug in the Apple ID password reset feature with “push bombing” or “MFA fatigue” techniques.....»»

Category: topSource:  theglobeandmailRelated NewsMar 27th, 2024

If you"re getting dozens of password reset notifications, you"re being attacked

Apple users are becoming the target of a new wave of phishing attacks called "MFA Bombing" that relies on user impatience, and a bug in Apple's password reset mechanism.An example of the Apple ID password reset notificationPhishing attacks often rely.....»»

Category: appleSource:  appleinsiderRelated NewsMar 27th, 2024

Attackers leverage weaponized iMessages, new phishing-as-a-service platform

Scammers are leveraging the Darcula phishing-as-a-service platform, iMessages and Google Messages to great effect. The platform allows them to impersonate a variety of brands based in over 100 different countries: postal services, public and private.....»»

Category: securitySource:  netsecurityRelated NewsMar 27th, 2024

APT29 hit German political parties with bogus invites and malware

APT29 (aka Cozy Bear, aka Midnight Blizzard) has been spotted targeting German political parties for the first time, Mandiant researchers have shared. Phishing leading to malware The attack started in late February 2024, with phishing emails containi.....»»

Category: securitySource:  netsecurityRelated NewsMar 25th, 2024

Scammers steal millions from FTX, BlockFi claimants

Customers of bankrupt crypto platform BlockFi have been targeted with a very convincing phishing email impersonating the platform, asking them to connect their wallet to complete the withdrawal of remaining funds. Judging by this Reddit thread, many.....»»

Category: securitySource:  netsecurityRelated NewsMar 25th, 2024

8 cybersecurity predictions shaping the future of cyber defense

Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to.....»»

Category: securitySource:  netsecurityRelated NewsMar 25th, 2024

Attackers are targeting financial departments with SmokeLoader malware

Financially motivated hackers have been leveraging SmokeLoader malware in a series of phishing campaigns predominantly targeting Ukrainian government and administration organizations. The phishing campaign The Ukrainian SSSCIP State Cyber Protection.....»»

Category: securitySource:  netsecurityRelated NewsMar 22nd, 2024

The dark side of GenAI

Beyond traditional AI models, generative AI (GenAI) can create new content, images, and even entire scenarios from scratch. While this technology holds immense promise across various sectors, it also introduces challenges and threats to cybersecurity.....»»

Category: securitySource:  netsecurityRelated NewsMar 18th, 2024

Thrive Incident Response & Remediation helps organizations contain and remove threats

Thrive launched Thrive Incident Response & Remediation, an on-demand cybersecurity response service to contain and remove threats, along with engineering assistance to rebuild and restore critical systems. Phishing, ransomware and other cyberattacks.....»»

Category: securitySource:  netsecurityRelated NewsMar 12th, 2024

Image-based phishing tactics evolve

While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of.....»»

Category: securitySource:  netsecurityRelated NewsMar 12th, 2024

Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What organizations need to know about the Digital Operational Resilience Act (DORA) In this Help Net Security interview, Kris Lovejoy, Global Securi.....»»

Category: securitySource:  netsecurityRelated NewsMar 10th, 2024