Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 31 - How Generative AI is Reshaping Cyber Threats

While generative AI offers powerful tools for cyber defenders, it’s also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology.

Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

ChatGPT knows a lot about Len Noe, CyberArk’s resident technical evangelist, white hat hacker and biohacker. The biohacker piece of his title is a nod to the fact that Noe is transhuman (you might call him a cyborg and be right), which is why his grandkids call him “Robo Papa.” ChatGPT knows all of this.

Underwriting Cyber Risk Part 1: Focus on Cyber Hygiene

Cyber risk uncertainty is growing. Despite massive spending worldwide to the tune of $173 billion, cyber attacks keep occurring. Ransomware attacks—a type of cyberattack that encrypts an organization's network or locks users out of their devices and requires a ransom before restoring access—are costing companies 20 days of downtime on average. Within the next few years, nearly half of companies worldwide will experience cyber attacks on their software supply chains.

8 Cyber Hygiene Habits to Keep You Safe Online

We are all familiar with the importance of hygiene in our day-to-day lives so as not to get sick or spread germs to others; this same concept can also ring true in our digital lives by applying cyber hygiene habits to keep our privacy and security safe online. It is important to familiarize ourselves with these procedures to avoid common cybersecurity mistakes that can be detrimental to your online privacy, such as loss of files, corrupted data, or identity theft.

What is Threat Intelligence?

Threat intelligence is one of the most potent weapons we have against digital hazards. Yet, many organizations remain uncertain about what it entails, how to apply it effectively, and what threat intelligence solution to choose. This lack of understanding could be detrimental as cyber threats continue to evolve, becoming more sophisticated and disruptive. So, what is threat intelligence, and how can it help bolster an organization’s security posture?

TSMC - The World's Largest Semiconductor Supplier is Breached

TSMC is the world's largest semiconductor company with the greatest value. The organization was founded in 1987 and is based in Taiwan. The organization is named of the ten most valuable companies in the world today and is a significant superpower in the electronics world. As the need for semiconductor chips increases, the company continues to increase in value. This massive company serves millions of customers overall. Even top-tier companies like TSMC aren't safe from cyber attacks.