20% of Generative AI ‘Jailbreak’ Attacks are Successful

20% of Generative AI ‘Jailbreak’ Attacks are Successful

Generative AI jailbreak attacks, where models are instructed to ignore their safeguards, succeed 20% of the time, research has found. On average, adversaries need just 42 seconds and five interactions to break through. In some cases, attacks occur in as little as four seconds. These findings both highlight the significant vulnerabilities in current GenAI algorithms and the difficulty in preventing exploitations in real time. Of the successful attacks, 90% lead to sensitive data leaks, according…

Read More

Secure Organizations by Thinking Like a Hacker

Secure Organizations by Thinking Like a Hacker

“To catch a criminal, think like one.” In the rapidly evolving world of cybersecurity — where almost any average casual criminal can now leverage AI to launch attacks and hacking skills are for sale to the highest bidder on the dark web — network and security engineers need more than just technical expertise. They need to step into the shoes of a hacker. The best defense is a good offense, and understanding the tactics of…

Read More

Setting Up Your Network Security? Avoid These 4 Mistakes

Setting Up Your Network Security? Avoid These 4 Mistakes

Before you go and spend a ton of money on some “next-gen” network security solution, make sure you have the fundamentals locked down. Nearly one-third of businesses suffered a data breach in the last year, many of which were caused by common mistakes like: Weak passwords. Outdated software. Poor training. Excessive privileges. If you can avoid these mistakes, you make your organization a much less enticing target for hackers. In this post, we’ll walk through…

Read More

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Are Ghost Calls a Problem? Yes, if They Don’t Stop

A ghost call is an incoming call with no one on the other end when you answer it. Sometimes it’s an unrecognized number; other times the caller ID shows “Unknown.” Getting an occasional ghost call is common and nothing to worry about. But persistent ghost calls can be a major concern — particularly for businesses. Here’s why. Frequent ghost calls can tie up phone lines, preventing legitimate calls from reaching the company. This disruption can…

Read More

Make Cybersecurity Awareness Month a Game-Changer for You and Your Career

Make Cybersecurity Awareness Month a Game-Changer for You and Your Career

With cyber threats on the rise and the start of Cybersecurity Awareness Month, it couldn’t be a better time to elevate your skill set to meet attacks head-on—and defend, detect, and protect your data and networks. Here are some ways you can join us—one of the largest players in networking—on a mission to guard against cyber threats. Choose from our giveaway, training sale, new one-stop-shop resource hub, and a sample of our latest FREE cybersecurity…

Read More

5 Reasons Why Developers Should Attend Security Conferences

5 Reasons Why Developers Should Attend Security Conferences

On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and perhaps vague) response to them, and to others I’d meet who would be perplexed by my attendance at both BlackHat and DefCon, was that I wanted a better…

Read More

Microsoft Reports on Progress of Revamping Security Efforts

Microsoft Reports on Progress of Revamping Security Efforts

On Sept. 23, Microsoft released a report detailing the progress of the Secure Future Initiative, the company-wide overhaul put in place in November 2023. The Secure Future Initiative exists to improve security in the wake of some high-profile vulnerabilities in 2023. These vulnerabilities included a breach in Microsoft Exchange Online that allowed threat actors associated with the Chinese government to access U.S. government emails in 2023. In April 2024, the U.S. Cyber Safety Review Board…

Read More

Email Attacks a Problem for National Infrastructure Companies

Email Attacks a Problem for National Infrastructure Companies

Cyber attackers are repeatedly using malicious emails to infiltrate critical national infrastructure. Up to 80% of CNI companies experienced an email-related security breach in the last year, according to a new report from security solution provider OPSWAT. Compromising CNI, like utilities, transport, telecommunications, and now data centres, can lead to widespread disruption, making it a prime target for cyber attacks. A recent report from Malwarebytes found that the services industry is the worst affected by…

Read More

Proofpoint Doubles Down On Partner Services, AI, Data Security

Proofpoint Doubles Down On Partner Services, AI, Data Security

The email and data security vendor has unveiled an array of updates that are geared toward increasing opportunities for channel partners, according to Proofpoint Channel Chief Joe Sykora. Proofpoint is rolling out an array of updates across partner services, data protection and AI security capabilities that are geared toward increasing opportunities for the channel, according to Proofpoint Channel Chief Joe Sykora. The updates came during Proofpoint’s Protect conference last week in New York and aim…

Read More

U.S. Tax Reform Can Fuel AI and Cybersecurity Innovation

U.S. Tax Reform Can Fuel AI and Cybersecurity Innovation

In the rapidly evolving technology landscape and amid a proliferation of developments in artificial intelligence (AI), cybersecurity threats and data breaches are equally on the rise. Both AI and cybersecurity have quickly emerged as important areas for innovation and investment. AI enhances cybersecurity by enabling faster, more accurate threat detection and response, while cybersecurity protects AI systems and our increasingly interconnected world. As a result of this dynamic, countries and companies are doing all they…

Read More
1 5 6 7 8 9 27