The rise of adversarial AI threatens smaller organizations

AI security attack

Email remains a vital channel for business communications, but the availability of easy-to-use AI tools makes protecting the inbox a challenge as it's easier than ever for cybercriminals to launch sophisticated attacks.

A new report from Abnormal Security charts the rise of adversarial AI which has seen a 54 percent year-on-year rise in business email compromise attacks.

Continue reading

Deepgram launches improved AI-based voice transcription for enterprises

Voice print

Accurate voice transcription is important for enterprises, whether it's to ensure appropriate responses or create accurate records.

However some situations make this challenging to achieve -- where there are multiple speakers or noisy backgrounds, for example. With the launch today of Nova-3, its most advanced speech-to-text (STT) model to date, Deepgram is looking to offer greater accuracy along with self-service customization to tailor results for industry-specific needs. 

Continue reading

Enterprises under growing pressure to demonstrate readiness for cyber threats

Risk threat readiness

A new study commissioned by Immersive Labs shows 96 percent of cyber leaders believe effectively communicating cyber-readiness to senior leadership and boards will be crucial in 2025, driven by regulatory compliance requirements and an increase in attacks.

The survey conducted by Sapio Research reveals that 49 percent of those surveyed report having experienced a cyberattack in the past year.

Continue reading

Regulated industry execs say security detection tech falls short

Data breach investigation detective

A new report reveals that 74 percent of IT security directors in regulated industries in the US and UK find detection-based security technologies outdated and inadequate.

The study from Everfox shows more than three-quarters of those polled believe security teams in regulated industries must shift their mindset from detecting threats to preventing them. 62 percent agree that AI and emerging malicious actor trends are increasing attack sophistication.

Continue reading

Ensuring transparency when deploying AI [Q&A]

AI interface brain

There are many factors to consider when deploying AI into an organization, not least of which is maintaining transparency and trust in the process.

We spoke to Iccha Sethi, VP of engineering at Vanta, to learn more about why transparency is so important and how governments and enterprises are responding to this challenge.

Continue reading

1Password takes pole position with F1 team

Oracle Red Bull Racing _ 1Password _Steering wheel - 44

Identity security company 1Password is announcing that it will become Oracle Red Bull Racing's exclusive cybersecurity partner in a multi-year deal.

The Formula 1 team will implement 1Password Extended Access Management to strengthen its security posture and safeguard critical information across devices, applications, and locations. The 1Password branding will also be shown on the steering wheel screen of both Max Verstappen and Liam Lawson’s RB21 cars.

Continue reading

Number of active dark web ransomware groups up 38 percent in 2024

Ransomware dark web

A total of 94 ransomware groups listed victims in 2024 (a 38 percent increase on 2023) with 49 new groups observed, according to a new report, reflecting further complexity in the ransomware landscape.

The study from Searchlight Cyber also finds an 11 percent increase in the number of total victims posted on ransomware leak sites in 2024 (5,728) compared to 2023 (5,081).

Continue reading

Sophisticated attack strategies target smaller businesses

script-attack

Hackers are taking the methods and strategies tested on larger companies and applying them to organizations of every size.

Advanced evasion techniques -- once exclusive to advanced persistent threats -- have become the new normal, according to the latest threat report from Huntress. Techniques include endpoint detection and response (EDR) tampering, bring your own vulnerable driver (BYOVD) privilege escalations, and User Account Control (UAC) bypasses.

Continue reading

Incorporating 'secure by design' into the software supply chain [Q&A]

Secure by design

Developers historically have not been all that security savvy, but as software supply chain security becomes a larger and larger problem every day, enterprises are going to need to secure packages before they are put into production environments.

We spoke to Phylum CEO, Aaron Bray, to learn more about 'secure by design' and how it can make sure developers are being taught security as part of their development and training process and are also being provided with the necessary resources to code securely from the beginning.

Continue reading

GenAI is changing enterprise priorities with privacy a major concern

Artificial intelligence business

The latest Enterprise Cloud Index (ECI) survey from Nutanix shows that that while 80 percent of organizations have already implemented a GenAI strategy, implementation targets vary significantly.

Organizations are eager to leverage GenAI for productivity, automation, and innovation, but they also face critical hurdles in the form of data security, compliance, and IT infrastructure modernization. 95 percent of respondents agree that GenAI is changing their organization’s priorities

Continue reading

Shaping the future of cloud security with CNAPP [Q&A]

Cloud security lock

As cloud environments become complex, security teams face increasing challenges in detecting, prioritizing, and addressing risks.

While cloud security posture management (CSPM) tools were created to provide visibility into cloud configurations and cloud workload protection platforms (CWPP) to manage threats to cloud workloads, they created gaps in providing holistic context that enables efficient risk management and didn't extend across the full software development life cycle (SDLC).

Continue reading

Phishing up almost 50 percent since 2021 with AI attacks on the rise

Woman touching a phishing concept

The latest Phishing Trends Report from Hoxhunt -- based on a global sample size of 2.5 million email users, 50 million phishing simulations, and millions of real phishing attacks -- shows a 49 percent increase in phishing since 2021, driven partly by the rise of blackhat AI.

Among the findings are that between 0.7 percent and 4.7 percent of reported phishing attempts are written by AI. This may seem low but to put it into context numbers of AI phishing attempts were negligible six months earlier. Highly targeted, AI-enabled spear phishing attacks with multiple links in the kill chain are on the rise.

Continue reading

Enterprises using inaccurate data to make business decisions

Decision data

According to a new study of 750 business and tech leaders, 58 percent say key business decisions are based on inaccurate or inconsistent data most of the time, if not always.

The research from IT consulting and digital services provider SoftServe shows the majority don’t understand the value of their data with 65 percent of all respondents believing no one at their organization understands all the data collected and how to access it.

Continue reading

Elections and increasing censorship spark hike in VPN use

Touching VPN logo

With authoritarian governments increasingly turning to censorship to silence dissent, limit information, and manipulate public opinion, it's perhaps not surprising that more people are turning to VPNs.

A new report from Proton VPN finds 2024 saw spikes in signups in 119 countries, including six countries with at least one spike in signups of over 5,000 percent, and four countries with at least one spike in signups of over 10,000 percent.

Continue reading

Over half of UK financial institutions suffer third-party supply chain attacks

Software supply chain blockchain

New research from Orange Cyberdefense shows that 58 percent of large UK financial services firms suffered at least one third-party supply chain attack in 2024, with 23 percent being targeted three or more times.

The research suggests that firms must re-evaluate how they assess third-party risk. 44 percent of FS institutions only assess third-party risk during the initial supplier onboarding stage, while a similar proportion (41 percent) perform periodic risk assessments. Crucially, just 14 percent follow the gold standard of continuously assessing risk and using dedicated third-party risk management tools.

Continue reading

Load More Articles