AI in Cybercrime: Hackers Exploiting OpenAI

AI in Cybercrime: Hackers Exploiting OpenAI

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses reports from OpenAI that hackers are trying to use its tools for malicious purposes. The podcast can be listened to in its entirety below.  ... Read More
How to Create a File Integrity Monitoring Strategy

How to Create a File Integrity Monitoring Strategy

Businesses of all sizes have strategies that apply to various aspects of their operations. From marketing to finance and from sales to hiring, strategies must be developed and implemented across departments ... Read More
Key Features to Look for in File Integrity Monitoring Software

Key Features to Look for in File Integrity Monitoring Software

An organization's IT infrastructure monitoring needs to provide alerts for unplanned downtime and network intrusion and secure the systems and data. To accomplish this, File Integrity Monitoring (FIM) can be implemented. Whether you're looking to add an FIM to secure your enterprise or switch FIM software, there are key features ... Read More
The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024

The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024

| | cybercrime, Cybersecurity
Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage, an increasing number of endpoints in their network, and the ever-changing cyber crime threat vector. As mentioned in Cimcor's 2023 Cybercrime Landscape Report, over 70% of breaches are now ... Read More
Disney Leak Reveals Financial and Strategy Secrets

Disney Leak Reveals Financial and Strategy Secrets

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses a recent data breach affecting information from Disney, including a range of financial strategy details that shed light on the entertainment giant's operations. The ... Read More
Breaking Down the House's New Artificial Intelligence Policy

Breaking Down the House’s New Artificial Intelligence Policy

|
In a groundbreaking move, the House Administration Committee, along with the Chief Administrative Officer (CAO) for the House of Representatives, have introduced a comprehensive policy aimed at governing the use of artificial intelligence (AI) within the lower chamber. This policy is a significant milestone designed to foster the secure and ... Read More
Defending Against Ransomware Threats: Tactics and Procedures Revealed by CISA

Defending Against Ransomware Threats: Tactics and Procedures Revealed by CISA

| | cybercrime
In a recent announcement, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning about the increasing ransomware threat posed by Iran-based cyber actors. The advisory highlighted the specific tactics, techniques, and procedures employed by a group of threat actors associated with the Iranian government and an undisclosed IT company ... Read More
5 Ways to Reduce Information Security Risk in a Mobile Workplace

5 Ways to Reduce Information Security Risk in a Mobile Workplace

Today's talent is no longer bound by the cubicle. For many, home offices and Wi-Fi-enabled coffee shops are the new workplaces. One study shows that 41% of employees in North America alone work outside the office at least some of the time ... Read More
Defending Against Zero-Day Attacks: How CimTrak Foils CVE-2024-38213 Exploits

Defending Against Zero-Day Attacks: How CimTrak Foils CVE-2024-38213 Exploits

Zero-day vulnerabilities remain a significant threat to cybersecurity, particularly for enterprise environments. One of the latest and most concerning examples is CVE-2024-38213, nicknamed "Copy2Pwn." This vulnerability allows attackers to bypass the Windows Mark of the Web (MotW) security feature. By exploiting this flaw, malicious files can enter a system without ... Read More
Microsoft-CrowdStrike Outage Explained

Microsoft-CrowdStrike Outage Explained

| | Cybersecurity, Podcast, SBN News
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses the July 2024 CrowdStrike outage, explaining what happened and more.  ... Read More