AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

For the third consecutive quarter, Gartner has found that cyber attacks staged using artificial intelligence are the biggest risk for enterprises. The consulting firm surveyed 286 senior risk and assurance executives from July through September, and 80% cited AI-enhanced malicious attacks as the top threat they were concerned about. This isn’t surprising, as evidence suggests AI-assisted attacks are on the rise. Other commonly cited emerging risks outlined in the report include AI-assisted misinformation, escalating political…

Read More

Number of Active Ransomware Groups Highest on Record

Number of Active Ransomware Groups Highest on Record

This year has seen the highest number of active ransomware groups on record, with 58 attacking global businesses in the second quarter. Threat intelligence platform provider Cyberint has reported only a slight dip in the third quarter, with 57 active groups. Furthermore, in Q3, the top 10 ransomware groups were responsible for only 58.3% of all detected attacks. This reflects both the increase in the number of active groups in general and a decline in…

Read More

NIS 2 Compliance Deadline Approaches: What You Need To Know

NIS 2 Compliance Deadline Approaches: What You Need To Know

On Oct. 17, the Network and Information Security 2 Directive takes effect. This means that relevant entities in industries such as energy, transport, water, healthcare, and digital infrastructure that carry out activities within the E.U. must comply with the relevant legislation. NIS 2, which was approved by the European Parliament in November 2022, aims to establish a consistent, minimum cybersecurity baseline across all E.U. member states, involving mandatory security measures and reporting procedures. Organisations subject…

Read More

7 Security and Compliance Tips From ISC2 Security Congress

7 Security and Compliance Tips From ISC2 Security Congress

During Cybersecurity Awareness Month, thousands of cyber experts from across the globe convened in Las Vegas for the ISC2 Security Congress 2024 to discuss the industry challenges and best practices — including strategies for reducing business risks and minimizing uncertainty in their operations. Ralph Villanueva was one of those cyber professionals who offered advice to audiences. An IT security and compliance analyst at Hilton Grand Vacations, he riffed on the popular business self-help book “7…

Read More

New OpenTofu Providers for Cisco Technologies Now Available!

New OpenTofu Providers for Cisco Technologies Now Available!

If you are cloud-native, you probably work with Terraform modules and providers. Since Terraform changed its license, some communities and companies have decided to keep the project open-source and create OpenTofu. OpenTofu is a fork of Terraform created as an initiative by Gruntwork, Spacelift, Harness, Env0, Scalr, and others in response to HashiCorp’s switch from an open-source license to the BUSL. OpenTofu is open-source, community-driven, and managed by the Linux Foundation. Users can use OpenTofu…

Read More

99% of UK Businesses Faced Cyber Attacks in the Last Year

99% of UK Businesses Faced Cyber Attacks in the Last Year

Nearly all businesses with at least 2,000 employees were breached by cyber attackers in the last 12 months, a new report has found. The biggest risk factor, cited by 46%, was remote and hybrid workers. Dispersed workforces raise the risk of data breaches by elying on unsecured networks and personal devices, and ensuring security protocols across multiple locations while managing access presents significant challenges for IT teams. “Where policies are inconsistent, they can create gaps…

Read More

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive, a non-profit digital library best known for its Wayback Machine, has disclosed a major data breach affecting over 31 million users as well as a series of distributed denial-of-service attacks. On the afternoon of Oct. 9, visitors of The Internet Archive started seeing pop-up messages that read: “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just…

Read More

Only a Quarter of Cybersecurity Professionals are Women

Only a Quarter of Cybersecurity Professionals are Women

As of 2023, women make up only 20% and 25% of the cybersecurity workforce, according to training body ISC2. New research from Deloitte explores the reasons behind this gender gap, despite the high demand for skilled professionals in the industry. Half of young working women interested in cybersecurity feel they lack sufficient knowledge of the field to pursue a career in it. Furthermore, 55% of all women surveyed believe the industry could prove intimidating, and…

Read More

20% of Generative AI ‘Jailbreak’ Attacks are Successful

20% of Generative AI ‘Jailbreak’ Attacks are Successful

Generative AI jailbreak attacks, where models are instructed to ignore their safeguards, succeed 20% of the time, research has found. On average, adversaries need just 42 seconds and five interactions to break through. In some cases, attacks occur in as little as four seconds. These findings both highlight the significant vulnerabilities in current GenAI algorithms and the difficulty in preventing exploitations in real time. Of the successful attacks, 90% lead to sensitive data leaks, according…

Read More

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Are Ghost Calls a Problem? Yes, if They Don’t Stop

A ghost call is an incoming call with no one on the other end when you answer it. Sometimes it’s an unrecognized number; other times the caller ID shows “Unknown.” Getting an occasional ghost call is common and nothing to worry about. But persistent ghost calls can be a major concern — particularly for businesses. Here’s why. Frequent ghost calls can tie up phone lines, preventing legitimate calls from reaching the company. This disruption can…

Read More
1 2 3 4 15