Kroll cyber threat landscape report: AI assists attackers
CSO | Security News
by
16h ago
In its frontline threat intelligence report for the first quarter of 2024, risk and financial advisory firm Kroll revealed that, as in virtually every other industry, cyber criminals are using artificial intelligence (AI) to further their goals. Well-known tactics such as those used in business email compromise (BEC) are being augmented with AI. And, it added, security controls designed to reduce the success of BEC attacks, such as the requirement for verbal authentication of requests from C-suite executives, are being circumvented by using AI to clone the executives’ voices and create deepfa ..read more
Visit website
Windows Recall — a ‘privacy nightmare’?
CSO | Security News
by
16h ago
Windows Recall, the new feature that records a user’s screen at regular intervals, has been labelled a “privacy nightmare” due to potential data privacy and security risks. Microsoft announced the generative AI-based tool on Monday; it records “snapshots” of a user’s screen every five seconds to provide a searchable log of historic actions going back three months. The feature will be available in preview in new Copilot+ PCs Microsoft and other vendors will begin selling in mid-June. Read more on Computerworld ..read more
Visit website
What is spear phishing? Examples, tactics, and techniques
CSO | Security News
by
16h ago
Spear phishing definition Spear phishing is a direct, targeted email attack aimed at specific individuals that appears to come from a trusted sender. In spear phishing, attackers often use information gleaned from research to put the recipient at ease. The ultimate aim is to either infect devices with malware by convincing the recipient to click a link or download an attachment, or to trick the recipient into taking some other action that will benefit the attacker, usually handing over information or money. Spear phishing messages are crafted with care using social engineering techniques and ..read more
Visit website
Emerging ransomware groups on the rise: Who they are, how they operate
CSO | Security News
by
20h ago
The shutdown of BlackCat (ALPHV) in March and the law enforcement disruption of LockBit infrastructure in February have created a void in the ransomware ecosystem that’s quickly being filled by less experienced groups. So far this year, researchers from security firm Cyberint have seen 25 new ransomware groups post at least one victim on their data leak sites. Other established but previously smaller gangs have also increased their operational tempos in recent months, now occupying the top spots in monthly victim counts. “While we continue to track the ransomware landscape to determine long-t ..read more
Visit website
Building an AI strategy for the modern SOC
CSO | Security News
by
1d ago
Artificial intelligence (AI) holds significant promise to increase productivity across business functions, and cybersecurity is no exception. Arguably no area of the security operation is more poised to benefit from AI than the security operations center (SOC). Today’s SOC teams manage a constant onslaught of attacks while navigating a complex and fragmented tooling landscape, an immense volume of data, and a shortage of security expertise. Within this environment, a generative AI (GenAI) assistant, purpose-built as a security platform, presents a significant opportunity to enable security te ..read more
Visit website
Tracking manual attacks may deliver zero-day previews
CSO | Security News
by
1d ago
Differentiating between manual and bot attacks, and homing in on human ones in particular, can give security professionals a leg up on combatting fraud attempts versus corporate systems. According to a report released Thursday by LexisNexis, last year automated attacks (aka bots) did not see nearly the same increase (2%) as manual/human attacks, which soared by 19%. LexisNexis’ analysis of digital fraud attacks was based on its examination of 92 billion transactions. A cybercrime specialist not affiliated with the report said that the human versus bot attacks figure reported by LexisNexis was ..read more
Visit website
Microsoft amps up focus on Windows 11 security to address evolving cyberthreats
CSO | Security News
by
1d ago
Ahead of its Build conference this week, Microsoft announced a series of enhancements to Windows 11 aimed at making it more secure against a more intimidating, varied, and AI-enable threat landscape. In a blog post detailing the enhancements, David Weston, Microsoft’s vice president of enterprise and OS security, pointed out that in 2015, the company detected around 115 password attacks per second. Today, there are more than 4,000. “This landscape requires stronger and more comprehensive security approaches than ever before, across all devices and technologies we use in our lives, both at hom ..read more
Visit website
LockBit no longer world’s No. 1 ransomware gang
CSO | Security News
by
1d ago
Well-known ransomware gang LockBit has been usurped as the world’s top ransomware gang, according to a recent report from NCC Group. For the past eight months, LockBit has led the world in ransomware attacks. But the group had its assets seized in February in connection with a crackdown by The National Crime Agency of the UK, working in conjunction with the FBI and international law enforcement, known as “Operation Chronos.” LockBit ransomware-as-a-service (RaaS) was launched in 2019, and by 2022, it was vying with Russia-backed Conti for the top ransomware group. Conti’s disintegra ..read more
Visit website
EU resilience regulation DORA has financial CISOs waiting for answers
CSO | Security News
by
2d ago
It just over seven months, the Digital Operational Resilience Act (DORA) enters into force in the EU — and not every organization is prepared. The regulation, which will apply as of January 17, 2025, covers the financial sector, but the regulation’s reach extends beyond traditional players such as banks, investment firms, and insurance companies, to also include crypto-asset providers, data reporting providers, and cloud service providers — actors who may not be as used to dealing with comprehensive regulations such as DORA.  “It is a very comprehensive regulation that is also supplement ..read more
Visit website
Critical flaw found in Fluent Bit cloud services monitoring component
CSO | Security News
by
2d ago
Security researchers at Tenable have discovered a potentially critical memory corruption vulnerability in Fluent Bit, a core component in the monitoring infrastructure of many cloud services. The vulnerability, dubbed Linguistic Lumberjack and tracked as CVE-2024-4323, stems from coding flaws within Fluent Bit’s built-in HTTP server. Left unresolved the vulnerability could lead to denial of service, information disclosure, or (in the most severe but unlikely case) remote code execution attacks. Fluent Bit versions 2.0.7 through 3.0.3 are all vulnerable. Fluent Bit version 3.0.4 closes this vu ..read more
Visit website

Follow CSO | Security News on FeedSpot

Continue with Google
Continue with Apple
OR