America's drinking water is facing attack, with links back to China, Russia and Iran

America's drinking water is facing attack, with links back to China, Russia and Iran

Houston Chronicle/hearst Newspapers Via Getty Images | Hearst Newspapers | Getty Images The city of Wichita, Kansas, recently had an experience that’s become all too common — its water system was hacked. The cyberattack, which targeted water metering, billing and payment processing, followed the targeting of water utilities across the U.S. in recent years. In going after America’s water, hackers aren’t doing anything special. Despite rising fears of AI use in cyber threats, the go-to…

Read More

A Microsoft under attack from government and tech rivals after 'preventable' hack ties executive pay to cyberthreats

A Microsoft under attack from government and tech rivals after 'preventable' hack ties executive pay to cyberthreats

Microsoft has come under fire recently from both the U.S. government and rival companies for its failure to stop a Chinese hack of its systems last summer. One change the tech giant is making in response: linking executive compensation more closely to cybersecurity. In April, a government review board described a hack of Microsoft last summer attributed to China as “preventable.” The U.S. Department of Homeland Security’s Cyber Safety Review Board pointed to “a cascade of…

Read More

Prompt Hacking, Private GPTs and Zero-Day Exploits: The Impacts of AI on Cyber Security Landscape

Prompt Hacking, Private GPTs and Zero-Day Exploits: The Impacts of AI on Cyber Security Landscape

AI’s newfound accessibility will cause a surge in prompt hacking attempts and private GPT models used for nefarious purposes, a new report revealed. Experts at the cyber security company Radware forecast the impact that AI will have on the threat landscape in the 2024 Global Threat Analysis Report. It predicted that the number of zero-day exploits and deepfake scams will increase as malicious actors become more proficient with large language models and generative adversarial networks….

Read More

US and UK go after Chinese hackers accused of state-backed operation against politicians, dissidents

US and UK go after Chinese hackers accused of state-backed operation against politicians, dissidents

WASHINGTON (AP) — Hackers linked to the Chinese government launched a sweeping, state-backed operation that targeted U.S. officials, journalists, corporations, pro-democracy activists and the U.K.’s election watchdog, American and British authorities said Monday in announcing a set of criminal charges and sanctions. The intention of the campaign, which officials say began in 2010, was to harass critics of the Chinese government, steal trade secrets of American corporations and to spy on and track high-level political…

Read More

AI & Your Family: The Wows and Potential Risks | McAfee Blog

AI & Your Family: The Wows and Potential Risks | McAfee Blog

When we come across the term Artificial Intelligence (AI), our mind often ventures into the realm of sci-fi movies like I, Robot, Matrix, and Ex Machina. We’ve always perceived AI as a futuristic concept, something that’s happening in a galaxy far, far away. However, AI is not only here in our present but has also been a part of our lives for several years in the form of various technological devices and applications. In our…

Read More

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Relentless cyberattacks and pressure to fix security gaps despite budget constraints are raising the stress levels of corporate cyber leaders and their worries about personal liability, a growing concern since the criminal case against Uber Technologies ’ former security chief. Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board….

Read More

Just 49% of organizations have funds for current cybersecurity needs

Just 49% of organizations have funds for current cybersecurity needs

Just 49% of organizations have funds for current cybersecurity needs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The cloud: A cryptojacker’s playground

The cloud: A cryptojacker’s playground

The cloud: A cryptojacker’s playground | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

92% of enterprises experienced an email security incident last year

92% of enterprises experienced an email security incident last year

92% of enterprises experienced an email security incident last year | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2 3