OpenAI's GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities

OpenAI's GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities

The GPT-4 large language model from OpenAI can exploit real-world vulnerabilities without human intervention, a new study by University of Illinois Urbana-Champaign researchers has found. Other open-source models, including GPT-3.5 and vulnerability scanners, are not able to do this. A large language model agent — an advanced system based on an LLM that can take actions via tools, reason, self-reflect and more — running on GPT-4 successfully exploited 87% of “one-day” vulnerabilities when provided with…

Read More

Retail Tech Deep-Dive: Meraki Switching

Retail Tech Deep-Dive: Meraki Switching

Join us as we dive deeper into Cisco and Cisco partner technology deployed at the Cisco Store! We asked Julie Nguyen (Product Manager, Meraki Switching Platform) to discuss how the switches are used in the Cisco Store and the larger retail industry.   How do Meraki switches improve a retailer’s and shopper’s in-store and/or virtual shopping experience? What problem are they solving? Network switches keep the world connected and moving as devices become smart and…

Read More

How Cisco is Redefining Security and Our Partner Experience

How Cisco is Redefining Security and Our Partner Experience

The past few weeks have solidified for me why I came to Cisco (almost a year ago, which is hard to believe). From the announcements of Cisco Hypershield and the Splunk acquisition, combined with power of our networking and data center expertise, and the greatest partners in the world—we’re now an unstoppable force in security. A New Era of Distributed, AI-Native Security Announced on April 18, 2024, Cisco is empowering our partners with a new…

Read More

Quantum Cloud Computing Secured in New Breakthrough at Oxford

Quantum Cloud Computing Secured in New Breakthrough at Oxford

Businesses are one step closer to quantum cloud computing, thanks to a breakthrough made in its security and privacy by scientists at Oxford University. The researchers used an approach dubbed ‘blind quantum computing’ to connect two quantum computing entities (Figure A); this simulates the situation where an employee at home or in an office remotely connects to a quantum server via the cloud. With this method, the quantum server provider does not need to know…

Read More

Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

The number of devices infected with data-stealing malware in 2023 was 9.8 million, a sevenfold increase over the same figure for 2020, according to new research from Kaspersky Digital Footprint Intelligence. However, the researchers believe that the true figure could be as high as 16 million, as credentials from devices infected in 2023 may not be leaked onto the dark web until later this year (Figure A). Figure A: Number of infections of data-stealing malware…

Read More

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Organisations that have backed up their sensitive data may believe they are relatively safe from ransomware attacks; however, this is not the case based on findings from a new study from IT security company Sophos. The report showed that cybercriminals attempted to compromise the backups of 94% of companies hit by ransomware in the past year. Attackers are aware that those who fall victim to ransomware must choose to either pay the ransom or recover…

Read More

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Raj Samani, Chief Scientist. Image: Rapid7 New research from cyber security firm Rapid7 has shown the ransomware attacks that IT and security professionals are up against in APAC are far from uniform, and they would be better off tapping intelligence that sheds light on attack trends in their specific jurisdiction or sector. Raj Samani, chief scientist at Rapid7, said actual ransomware threats often differ from assumptions based on news coverage. Attack surface research revealed significant…

Read More

Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI

Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI

The C-suite is more familiar with AI technologies than their IT and security staff, according to a report from the Cloud Security Alliance commissioned by Google Cloud. The report, published on April 3, addressed whether IT and security professionals fear AI will replace their jobs, the benefits and challenges of the increase in generative AI and more. Of the IT and security professionals surveyed, 63% believe AI will improve security within their organization. Another 24%…

Read More

Cisco Meraki for Government Achieves FedRAMP® Agency Authority to Operate

Cisco Meraki for Government Achieves FedRAMP® Agency Authority to Operate

We are happy to announce that Cisco Meraki has successfully achieved FedRAMP® agency Authority to Operate (ATO), creating a separate cloud-based platform for U.S. Government entities, including the flagship Meraki networking products MX (security and SD-WAN), MS (switching), and MR (access points). This is a major milestone for us as we continue to scale Meraki infrastructure to meet the needs of larger governments and enterprise customers as we move toward our vision of Cisco Networking…

Read More

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations. It appears Asia-Pacific employees are not getting the message. Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. The company found that…

Read More
1 2 3 7