Don't walk the walk when creating passwords
When you're creating a new password in a hurry it's tempting to choose keys that are adjacent to each other on the keyboard. In security circles this is known as a 'walk pattern'.
Of course this is horribly insecure but it's also worryingly common. New research from Specops has analyzed an 800 million password subset of its larger Breached Password Protection database to find the top keyboard walk patterns in compromised password data.
Why SOCs need urgent modernization [Q&A]
Security Operations Centers (SOCs) aim to detect, investigate, remediate, and restore organizational systems to a fully functional, secure state, whether it's defending against insider threats, data exfiltration attempts, or malware attacks.
However, examining the daily issues faced by many SOCs reveals a concerning array of challenges that place increasing pressure on the work of SOCs and the dedicated professionals who manage them.
Gaps in digital rights management pose serious risk
Serious gaps in digital rights management could expose private and public sector organizations to security and compliance risks.
A new 'Sensitive Content Communications Privacy and Compliance' report from Kiteworks finds many organizations lack unified tracking, control, and security of private data that is sent, shared, and transferred with third parties, which creates significant risk of unauthorized access, both malicious and accidental.
AI: Good or bad for the cyber threat landscape?
In recent months, the buzz surrounding AI technology has grown rapidly, due in large part to the release -- and subsequent zeitgeist moment -- of ChatGPT. A chatbot fueled by language modeling AI technology that is free to the public, ChatGPT has been the subject of seemingly endless discourse regarding its implications since its launch last November.
This type of AI technology is convincing and well… intelligent. It’s almost like a contemporary iteration on the concept of a search engine -- you can type in a prompt, and within moments you’ll receive a well-articulated, seemingly accurate response pulling from sources all over the web.
Facebook and Microsoft are the most popular phishing bait
A new report reveals the most impersonated brands in phishing attacks for the first half of 2023, with Facebook taking the top slot, followed by Microsoft.
The report from email security company Vade, shows Facebook accounted for 18 percent of all phishing URLs and Microsoft for 15 percent. Taken together these two accounted for more unique phishing URLs than the next top five brands combined (Crédit Agricole, SoftBank, Orange, PayPal and Apple).
Security teams continue to hire despite economic uncertainty
The cyber talent shortage is a greater concern for CISOs than ongoing economic uncertainty, according to the latest Information Security Maturity Report from ClubCISO and Telstra Purple.
Insufficient staff is named as the top (51 percent) concern for CISOs when asked which factors most affect their ability to deliver against their objectives.
Only two percent of organizations feel confident in their cybersecurity strategies
While 75 percent of organizations have made significant strides to upgrade their infrastructure in the past year and 78 percent have increased their security budgets, only two percent of industry experts are confident in their security strategies, according to a new report.
The study, from critical infrastructure protection specialist OPSWAT, also finds most organizations have embraced public cloud hosting for their web applications, with an overwhelming 97 percent already employing or planning to implement containerization.
AI will outperform the average hacker in five years -- say hackers
The latest 'In the Mind of a Hacker' report from Bugcrowd, which includes responses from 1,000 white hat hackers across 85 countries, finds 55 percent saying that generative AI can already outperform hackers or will be able to do so within the next five years.
But despite this, hackers aren't especially worried about being replaced, with 72 percent saying that generative AI will not be able to replicate the creativity of human hackers.
Organizations lack visibility into malware attacks
While IT security leaders are concerned about attacks that use malware-exfiltrated authentication data, many still lack the necessary tools to investigate the security and organizational impact of these infections and effectively prevent follow-on attacks.
Research from cybercrime analytics company SpyCloud shows 98 percent of over 300 mid-market and enterprise IT security professionals from the US and UK surveyed say better visibility into at-risk applications would significantly improve their security posture.
Are collaboration tools opening up a backdoor into enterprises? [Q&A]
The pandemic changed the way we work, with more people working from home and fewer in the office. That meant we became much more reliant on tools like Slack and Teams in order to keep in touch with colleagues.
Even though some people are now going back to the office, reliance on these collaboration tools remains high. The dark side of this trend is that cybercriminals have noticed and are increasingly using them as vectors for phishing attacks.
Blockchain and proptech are transforming real estate security
Infrastructure is becoming more vulnerable to cyber threats. Therefore, everyone from tech enthusiasts to real estate professionals must pay attention to how blockchain and proptech advancements change the game to keep stakeholders, business owners and tenants safe and sound.
Blockchain is a part of the proptech umbrella, but it encompasses so much -- and blockchain enhances it all.
Dealing with the data authorization blindspot [Q&A]
User authorization for access to data is complicated. Knowing who has access to what information is often difficult because of complex role hierarchies, different authorization models used for different technologies, and the variety of data that may be accessible across technologies and clouds.
Ben Herzberg, chief scientist at data security platform Satori, believes there's often a blindspot around authorization, but that the issue doesn't have to be as complex as it can seem. We talked to him to learn more.
Next gen SIEM: Unleashing the power of AI in cybersecurity
AI has been in the news over the past several months, but not everyone is welcoming it excitedly. Many renowned tech personalities have expressed their concerns over the risks associated with it and there are valid fears about artificial intelligence doing more harm than good. For example, there have been reports of AI helping cybercriminals produce less detectable malware.
It is reassuring to know that cybersecurity is among the early adopters in harnessing the benefits of artificial intelligence. Cybersecurity firms have been developing ways to integrate AI into their detection, mitigation, and prevention capabilities. Next gen security information and event management (SIEM), in particular, is gaining traction as organizations try to keep up with the growing aggressiveness and complexity of cyber threats.
Disrupting the phishing killchain with new defenses [Q&A]
Recent reports have shown that email is still the channel where enterprises are most vulnerable to attacks, in particular phishing.
But adding new browser-based layers of security protection can disrupt such killchains, for example by preventing phishing victims from accessing or engaging with spoofed sites. We spoke to Red Access co-founder and CTO Tal Dery to find out more.
Value of cybercrime equivalent to the third largest global economy
Whoever said 'crime doesn't pay' clearly did so before the advent of the internet. A new report shows that if cybercrime was a country it would be the third largest global economy, valued at $10.5 trillion by 2025. Some 33 billion records are estimated to be stolen in 2023 -- a huge increase of 175 percent from 2018.
The latest Cybercrime Statistics Report from Independent Advisor, shows that last year the cost to US businesses of an average cyberattack amounted to a huge $4.35 million. In addition, 83 percent of organisations got attacked more than once.
