Complexity is the new normal, which applies equally to businesses’ networks and wireless environments. This is complicated further by the fact that cyberattacks that seek to exploit vulnerabilities in organizations' WLANs (Wireless Local Area Networks) are becoming increasingly sophisticated. On World Wi-Fi Day, we want to offer you security tips to create a safer wireless environment.
Legitimate services can be exploited in social engineering, including business email compromise (BEC) attacks. Researchers at Check Point describe one current BEC campaign that’s using Soda PDF to send messages encouraging the recipients to call a phone number. Should they make the call, the bad actor on the line seeks to winkle them out of their cash. Check Point calls these kinds of attempts, which “leverage legitimate services to send out malicious material,” BEC 3.0.
Cybercriminals still know that the easiest way to successfully infiltrate an organization is through its people. While organizations continue evaluating and investing in their technology-based security layer, the human layer continues to be the most enticing and vulnerable attack vector. This marks the sixth consecutive year that KnowBe4 has analyzed hundreds of millions of data points in order to provide our annual Phishing by Industry Benchmark Report.
At Netskope, we’ve talked a lot lately about how to safely enable ChatGPT and other generative AI applications such as Google Bard and Jasper. Why? As the saying goes, “There’s no going back.” Generative AI is here to stay and will have a transformative effect on our day-to-day lives whether we’re in technology or not.
GitGuardian has made strategic executive hires and been selected for the French Tech 2030 program, positioning the company for growth and advancement in cybersecurity and code security solutions.