Safeguarding your marketing channels: how AI-powered automation is fueling new threats and how to defend against them


Scammers are already using AI-powered automation to manipulate marketing channels. We don't want to hand out a playbook for bad actors, but it's important to recognize the growing number of scams that have been enhanced by AI and automation tools. Most scams are still about money, either directly or by collecting personal data that can be used to access financial information. If there is no money, there is typically little motive.
In a space like eCommerce, for example, we've seen scammers clone legitimate websites to trick customers into handing over their payment information. These spoof sites look identical to the real thing.
Why threat hunting is more vital than ever [Q&A]


The threat landscape is rapidly changing and businesses can no longer simply wait for an attack to be caught by traditional tools or decide how to respond after it occurs.
Mike Mitchell, VP of threat intelligence at Intel 471, has experienced the evolution of threat hunting first-hand as he's been in the industry for decades. We spoke to him to learn more.
Security platform adopts Open API standards


Exabeam's cloud-native, New-Scale Security Operations Platform has become the first security operations platform compatible with the Open-API Standard (OAS).
This gives SOC teams the power to quickly create automations and playbooks with their best-of-breed portfolios and ditch disjointed, monolithic systems that provide merely 'good enough' security.
The importance of modernizing cyber defenses [Q&A]


The state of high-profile cyber incidents in recent years has highlighted the fact that defenses need to be kept up to date to provide adequate protection.
AI and machine learning have the potential to transform security operations to enhance protection against emerging threats. We spoke to Gurucul CEO Saryu Nayyar to get her view on how protection technologies are evolving and why this is so crucial.
WatchGuard makes enterprise-grade threat detection available for all organizations


Smaller businesses are often more at risk of cyberattack simply because they lack the resources of their larger counterparts.
WatchGuard Technologies is looking to change that with the launch of an open XDR solution that delivers levels of visibility into east/west and north/south network traffic previously only available to large enterprises with the resources to manage their own security operations center.
Security pros struggle with too many tools


New research by Keeper Security shows nearly half of security professionals (48 percent) say they favor standalone security solutions for specific issues.
But, this has resulted in security pros grappling with an average of 32 different security solutions in their tech stacks, and some managing hundreds of different security tools.
Automation is critical to effective security for smaller businesses


Automation is a critical capability for a proactive security strategy says a new report from automated endpoint and vulnerability management company Syxsense and Omdia, a global analyst.
The research surveyed over 400 respondents including decision makers from North America and Europe, Middle East, and Africa (EMEA), at small and midsize business (SMB)+ sized companies across a variety of industries.
Detectify launches new features for control over attack surfaces


Attack surfaces keep expanding, making it increasingly challenging for organizations to obtain and make sense of the most relevant insights from their attack surface data.
Attack surface management platform Detectify says its users see an average of 300 breaches per set policy, with over 70 percent of active policies focusing on spotting risky open ports.
Businesses not prepared for AI-based attacks


A new survey of almost 1,800 security leaders and practitioners in 14 countries, finds 74 percent of respondents believe AI-augmented cyberthreats are already having a significant impact on their organizations, yet 60 percent believe they are currently unprepared to defend against these attacks.
The study from Darktrace shows 71 percent of respondents are confident that AI-augmented security solutions will be able to detect and block AI-augmented threats. However, only 26 percent fully understand which types of AI are used in their security stack today.
Unlocking business potential through outcome-based security [Q&A]


Traditionally, organizations have focused on measuring the results of their cyber security strategies in terms of threat events or security incidents to determine how effective their security controls are.
However, in today's fast-paced world, the real game-changer is aligning security outcomes with business objectives and this is where 'outcome-based security' plays a huge role. It's a shift in focus for organizations, but one which can empower security teams to add even greater value to the strategic goals of the business.
How contextual analysis can offer insight into the human element behind cyber threats [Q&A]


Cyber threats can come in many forms, over email, messaging platforms or social media. But what they all have in common is that they seek to exploit human weaknesses.
We spoke to Chris Lehman, CEO of SafeGuard Cyber, to discover how contextual analysis of business conversations can help determine if a conversation is benign or if something suspicious is taking place, allowing action to be taken.
Unmasking cybersecurity's hidden threats


The cybersecurity landscape is experiencing an unprecedented surge in vulnerabilities. In 2022 alone, a staggering 25,096 new vulnerabilities were added to the National Vulnerability Database (NVD). This number represents the highest count of vulnerabilities ever recorded within a single year and reflects a 25 percent increase compared to the 20,196 new vulnerabilities reported in 2021.
This escalating trend indicates that cybersecurity threats are not only on the rise but are also accelerating at an alarming pace. The reasons behind this surge in vulnerabilities are multifaceted, stemming from factors such as the increasing complexity of software and technology systems, the rapid pace of digital transformation, and the growing sophistication of cyber attackers.
Why vulnerability management needs a refresh [Q&A]


Adversaries are exploiting new vulnerabilities much faster than organizations are remediating them. As a result, prioritizing the wrong vulnerabilities will squander security teams' most critical resource -- time.
So, how can organizations prioritize the right threats? We spoke with Anthony Bettini, founder and CEO of VulnCheck, to find out.
The evolution of cyber threat tactics [Q&A]


Data breaches and cyberattacks are seldom far from the news, and it's an area that seldom stands still for long.
We spoke to founder and CEO of White Knight Labs, Greg Hatcher, to discuss how threat tactics are evolving and what organizations can do to protect themselves.
Detection needs to improve to combat evolving malware


Critical infrastructure protection specialist OPSWAT has released its latest Threat Intelligence Trends survey looking at organizations to manage the current threat landscape and how to prepare for future challenges.
It finds that 62 percent of organizations recognize the need for additional investments in tools and processes to enhance their threat intelligence capabilities. Only 22 percent have fully matured threat intelligence programs in place though, with most indicating that they are only in the early stages or need to make additional investments in tools and processes.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.