Machine Learning. Security Friend or Foe?
Recent advancements in machine learning, the latest on Black Proxies, and the DHS Cyber Safety Board’s plan to review Lapsus$ gang’s hacking tactics.
Recent advancements in machine learning, the latest on Black Proxies, and the DHS Cyber Safety Board’s plan to review Lapsus$ gang’s hacking tactics.
Read also: Chinese hackers stole millions in US COVID benefits, New Zealand affected by a supply-chain attack, and more.
Malicious hackers, hell-bent on infiltrating an organisation, have no qualms about exploiting even the most tragic events. Take, for instance, the horrific crowd crush that occurred in Seoul's nightlife district of Itaweon on 29 October, when over 150 people were killed during Halloween festivities.
There’s no denying that multi-factor authentication (MFA) is an essential security measure that significantly improves an organization’s cyber posture. However, there is no silver bullet in cybersecurity. Though multi-factor authentication proves extremely helpful, determined and resourceful cybercriminals can still find techniques to bypass it. Let’s look at some frequently-used methods cyber-attackers leverage to bypass MFA.
Continuing our series about potential attack scenarios, learn how a very easy configuration mistake on GitHub can lead to a major security breach.
Plex was breached by an unauthorized third-party gained who gained access to a proprietary database. The specific attack vector that facilitated the breach hasn’t been disclosed. According to Plex, cybercriminals “tunneled” their way through sophisticated cybersecurity mechanisms to gain access to sensitive customer data.
This year has seen an enormous increase in the number and claimed impact of hacktivist attacks on critical infrastructure and enterprises operating in critical services. Many attacks target unmanaged devices such as Internet of Things (IoT) and operational technology (OT) equipment. Attacks are motivated by geopolitical or social developments across the globe, with the goal of spreading a message or causing physical disruption.
Email allows people to instantly connect with others across the world and share almost any information they want. They frequently contain text, document attachments and multimedia such as images and videos. With all of this information able to be shared, chances are you’ve sent a good amount of sensitive information to other people over the years – and that makes your email account a target for cybercriminals.
In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. While this technology offers great possibilities and convenience, it also can put your personal data at risk.