Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-generated phishing attacks are becoming more convincing

It's time for you and your colleagues to become more skeptical about what you read. That's a takeaway from a series of experiments undertaken using GPT-3 AI text-generating interfaces to create malicious messages designed to spear-phish, scam, harrass, and spread fake news. Experts at WithSecure have described their investigations into just how easy it is to automate the creation of credible yet malicious content at incredible speed.

The Latest Cybersecurity Trends for 2023

Cyberattacks have never been more common than they are now. This is particularly true as the world starts to recover from the pandemic and moves toward a more cloud-based approach. Did you know that 54% of businesses were victims of cyberattacks in the past year? And 75% reported increased security incidents, most frequently caused by identity thefts, ransomware,

College's data leak posing a significant security risk in southern Indian region

A thriving hacker has been found to be posting a college database showcasing it to be a breach. This happened to one of the colleges in the southern region of India, Kerala. Necessary measures have been taken to keep them up to date! The college’s information was found to be floating around on the Dark Web. These data seem to be highly sensitive. These data could be acquired by any human being for just a few thousand.

Create Permanent Shared Objects

A shared object refers to the code, which is shared across different programs instead of being replicated manually for each program. Here, the permanent shared objects are the codes that are bound to remain active in the system’s memory even after the program is over. The main purpose of creating the permanent shared objects is to ensure that these codes are stored in the memory and can be re-used multiple times as and when required.

Your Guide to Third-Party Risk Assessments

Third party risk assessment is the process of evaluating and managing the risks associated with engaging third parties. It involves identifying, assessing, and mitigating potential risks that could arise from working with external vendors or partners. The goal of this type of assessment is to ensure that any risks posed by these relationships are minimized or eliminated altogether.

Guide To NERC CIP Cybersecurity Standards

In the event that there was a malicious actor who wanted to disable a country or state's power supply, the utility sector would be one of the first targets of this attack as seen in the Moore County power outage and the recent attacks on Portland’s infrastructure. Whenever stakes are this critical, it is essential that security is prioritized throughout the systems and processes involved in such matters.

Preventing the Theft of IP and Military Secrets

A common topic in our blog is the threat that insiders pose to an organization’s sensitive data. Why? ‘Insider threats’ continue to pose the biggest threats to intellectual property (IP) and military secrets. Insiders, including contractors, need access to sensitive information to do their job, but to what extent? How can we prevent sensitive information from being exfiltrated by malicious insiders?

What Threatens Kubernetes Security and What Can You Do About It?

Kubernetes adoption has rocketed into ubiquity. At this point, 96 percent of organizations are either using Kubernetes for container orchestration or evaluating its use, according to the latest Cloud Native Computing Foundation annual survey. But this doesn’t mean that Kubernetes isn’t without security risks. The flexibility of container applications and their capability to carry discrete components that interact over the network present security challenges.

Improve your AWS security posture, Step 2: Avoid direct internet access to AWS resources

In the first blog in this series, we discussed setting up IAM properly. Now we’re moving on to the second step, avoiding direct internet access to AWS resources. When AWS resources like EC2 instances or S3 buckets are directly accessible via the Internet, they are vulnerable to attack. For example, brute force attacks on SSH login, denial of service (DOS) attacks on server resources via Layer 3, 4, or 7 flooding, or the inadvertent disclosure of data on an S3 bucket.