ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse of the ChatGPT name by cybercriminals, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware. Jump to: ChatGPT name is being abused by cybercriminals In the second half of 2023, ESET has blocked 650,000 attempts to access malicious domains whose…

Read More

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Third-party supply chain risk is a key concern from Australian cyber security professionals. With enterprises typically relying on an expanding network of interconnected systems — often suppliers of suppliers — it is becoming difficult to maintain data control to ensure security. Tesserent CEO Kurt Hansen said security professionals need strong governance and processes to ensure they are aware of all business activities. He added they need to be more conscious of how geopolitical tensions could…

Read More

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its website on Tuesday. Learn how to defend against ransomware. Image: Adobe/igor.nazlo On Dec. 19, the Department of Justice announced the FBI had been working on a disruption campaign against the ransomware group known as ALPHV, Noberus or BlackCat that resulted in the seizure of several of the group’s websites, visibility into their network and a decryption tool that…

Read More

How Education Institution Technology Needs to Evolve

How Education Institution Technology Needs to Evolve

The 2023 Education Summit event – co-hosted by Cisco and CAUDIT – provided higher education technology leaders an opportunity to gain new insights and perspectives on some of the rapid technology innovation and developments that will continue to transform the sector. The summit also provided delegates with a chance to share their experiences and to engage with peers from the sector. While Australia’s higher education institutions have a major role to play in harnessing digital…

Read More

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Almost overnight, Artificial Intelligence (AI) has become a priority for most organizations. A concerning trend is the increasing use of AI by adversaries to execute malicious activities. Sophisticated actors leverage AI to automate attacks, optimize breach strategies, and even mimic legitimate user behaviors, thereby escalating the complexity and scale of threats. This blog discusses how attackers might manipulate and compromise AI systems, highlighting potential vulnerabilities and the implications of such attacks on AI implementations. By…

Read More

How to Use Google's Titan Security Keys With Passkey Support

How to Use Google's Titan Security Keys With Passkey Support

Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys edition was used solely for multifactor authentication. Security keys offer a tangible token in the form of a device you may attach to a keyring and place in a pocket. For many people, a security key can be easier…

Read More

Cybersecurity career training for the real world

Cybersecurity career training for the real world

Riccardo Nobili’s passion for cybersecurity career training is palpable. Not only is Nobili the Head of Network at Leroy Merlin, a global home improvement and gardening retailer, but he is also a Cisco Networking Academy instructor where he enables students to become future cybersecurity defenders. If you’re also passionate about cybersecurity, check out our open opportunities. Scalable: Networks and student growth As the Head of Network at Leroy Merlin, Nobili is accountable for all parts…

Read More

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a financially-oriented threat actor dubbed TA4557 with high financial data theft risks and possibly more risks such as intellectual property theft. In this social engineering campaign, the threat actor targets recruiters with benign content before infecting their machines with the More_Eggs malware. This…

Read More

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. The U.S. Securities and Exchange Commission’s new rules around disclosure of cybersecurity incidents go into effect on Dec. 15 for public companies with fiscal years starting on or after that date. Publicly traded companies must annually report their processes for spotting, judging and mitigating cybersecurity…

Read More

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

The Cisco Talos Year in Review report released Tuesday highlights new trends in the cybersecurity threat landscape. We’ll focus on three topics covered: the ransomware cybercriminal ecosystem, network infrastructure attacks and commodity loader malware. More ransomware actors switched to extortion rather than encryption, while commodity loaders evolved to be stealthier and highly effective, although new major security improvements have seen the day in 2023, such as Microsoft Office disabling macros by default. Network devices are…

Read More
1 17 18 19 20 21 27