Password security is a major concern for companies, and one of the biggest challenges is getting employees to use better password hygiene. To shore up security, you need to find practices that your employees will actually use. To make it easier, consider sharing these five recommendations to help them find
Cybercriminals have started using OpenAI’s artificially intelligent chatbot ChatGPT to quickly build hacking tools, cybersecurity researchers warned on Friday. Scammers are also testing ChatGPT’s ability to build other chatbots designed to impersonate young females to ensnare targets, one expert monitoring criminal forums told Forbes. Many early ChatGPT users had raised
Society has been predicting the technology of the future since Jules Verne. Remember the Jetsons? Based on the predictions in that show, we should be flying cars to work and enjoying fully automated robot maid service. But for cybersecurity, predicting the future is grounded in realities that are already here.
Multi-factor authentication (MFA) is a good security measure, most of the time. It enables a company to add a layer of security to its corporate VPN, for example. The user, in addition to a (hopefully) strong password, needs to enter another code, which can be accessed from another device. It
Going into 2023, cybersecurity is still topping the list of CIO concerns. This comes as no surprise. In the first half of 2022, there were 2.8 billion worldwide malware attacks and 236.1 million ransomware attacks. By year end 2022, it is expected that six billion phishing attacks will have been
In the last decade, the world has witnessed the rapid evolution of the Internet of Things. While this technology has become pronounced in powering smart homes, outdoor surveillance and smart lighting, it is becoming increasingly pervasive in industrial spaces. Although there are plenty of use cases for industrial IoT solutions,
The transportation industry appears to be waking up to a renewed specter of threats following a series of distributed denial-of-service (DDoS) attacks that temporarily took down several U.S. airport websites. These sorts of targeted hacks on critical infrastructure often precede necessary and crucial advancements in the application of cybersecurity best
A standalone Command and Control (C2) server called “Alchimist” was recently discovered by Cisco Talos. The framework has been designed to run attacks via standalone GoLang-based executables that can be distributed easily. The framework found by Talos contains both the whole web user interface and the payloads. GoLang Written Framework
Open-source repository SourceHut is pulling the plug on software projects that tap into cryptocurrency and blockchain. In a post published on Monday, Oct. 31, SourceHut founder and creator Drew DeVault said he would ban projects associated with these technologies, citing their use in “get-rich-quick” schemes and other types of scams.
2022 marked another year in which ransomware proved to be one of the most pernicious cyberthreats around the world. Targeting victims both large and small, ransomware gangs showed that they could still wreak havoc despite efforts by law enforcement and governments to crack down on them. Though a variety of
Protecting data and applications in the cloud involves managing people, processes and technology with stringent policies. There has been a tremendous increase in the number of organizations migrating to the cloud due to its excellent reliability, scalability and reduced costs. Cloud security plays a key role in this transition and
As recently exposed by Cisco Talos, software supply chain attacks have gained popularity amongst all kinds of cyber criminals. Once exclusively used by cyberespionage threat actors, these attacks have now also become attractive for any kind of cybercriminal, who sees in this threat a way to compromise hundreds or thousands