Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Social Engineering Attacks Utilizing Generative AI Increase by 135%

New insights from cybersecurity artificial intelligence (AI) company Darktrace shows a 135% increase in novel social engineering attacks from Generative AI. This new form of social engineering that contributed to this increase is much more sophisticated in nature, using linguistics techniques with increased text volume, punctuation, and sentence length to trick their victim. We've recently covered ChatGPT scams and other various AI scams, but this attack proves to be very different.

Understanding OCR in Banking: Definition and Applications

OCR is the process of using technology to read characters from printed or handwritten text included inside digital images of actual documents, such scanned paper documents (optical character recognition). OCR’s primary function is to read a document’s text and convert the characters into code that may be used for data processing. Another name for optical character recognition is text recognition (OCR).

What You Need to Know About the Netskope Accelerator Package for Azure

Over its history Netskope has delivered many tools to integrate its various solutions and findings with Microsoft products. We have built multiple integrations with Azure Active Directory, Azure Sentinel, Azure Monitor, and Azure Blob and Compute. All of these are very helpful in unlocking base or advanced functionality to augment Microsoft solutions.

Using 1Password Service Accounts with GitHub Actions

1Password Service Accounts are now available in beta for all 1Password Business customers. This new account type let you automate infrastructure secrets in your apps or dev workflows without spinning up additional infrastructure. Watch this video to see how service accounts work with GitHub Actions.

Random but Memorable - Episode 10.5: Ban Cloud Fan Fiction with Stu Hirst from Trustpilot

Will TikTok be banned in the US? How much of a security risk is ChatGPT? We debate all that and more in Watchtower Weekly. Plus, we're joined by Stu Hirst, Chief Information Security Officer at Trustpilot. Tune in, as we discuss common cloud security banana-skins and the challenges facing CISOs in 2023.

Types of Phishing Attacks

There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It’s important to understand the different types of phishing attacks there are so you’re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about the different types of phishing attacks and how you can keep yourself safe from them.

5 Reasons the Healthcare Industry is Prone to Breaches

In 2022, the healthcare industry set a record no one will be eager to break. According to IBM’s 2022 Cost of a Data Breach report, the average cost of a breach in healthcare climbed to $10.1 million dollars, making it the industry with the highest average breach cost for 12 years running. Meanwhile, 57% of organizations are planning to increase their cybersecurity budgets in 2023.

LC101: Writing detection and response rules

LimaCharlie is a cybersecurity middleware platform to connect sources of security telemetry, automate activity based on what's being observed, and forward data where you need it. LimaCharlie puts you in complete control of your data, allowing you to build the security program that your organization wants and needs. In our next session, join Matt Bromiley, our Lead Solutions engineer, to continue the discussion in getting familiar with LimaCharlie's detection and response capabilities..

NCB Management Services Hit By a Cyber Attack Exposing Data for 500,000 Consumers

NCB Management Services is a debt-buying company that acquires debt from other businesses and attempts to collect that debt. The organization works with many major companies, such as Bank of America, and it suffered from a serious data breach recently. Since NCB works with so many major companies, customers of those companies can be put at risk of data loss when their data is lost.

The Internet Has Changed

Over the last decade, the internet has undergone significant changes. While in the past the internet was primarily used for accessing information, in recent years it has become a connectivity tool, providing access to critical business SaaS and IaaS. These cloud-based services have enabled businesses to be more agile and flexible, supporting remote work and vastly improving collaboration with colleagues across the globe.