90% of Successful Attacks Seen in the Wild Resulted in Leaked Sensitive Data

October 9, 2024 at 05:14PM Pillar Security released groundbreaking research detailing real-world attacks on GenAI, revealing a 90% data theft success rate and a 20% bypass rate of security measures. The report emphasizes increasing attack frequency and complexity, urging organizations to adopt dynamic security solutions and tailored strategies to combat emerging threats in the evolving … Read more

QR Codes: Convenience or Cyberthreat?

July 23, 2024 at 01:16PM Summary: Sara Atie’s article discusses the growing threat of QR code-based phishing attacks and the need for organizations to adopt robust protection measures to safeguard against these modern cyber threats. The article highlights common signs of QR code attacks and proposes proactive solutions to mitigate the risk. Key takeaways from … Read more

Energy Department Invests $45 Million in 16 Projects to Improve Cybersecurity

February 27, 2024 at 11:27AM The US Department of Energy has invested $45 million in 16 projects to enhance cybersecurity in the energy sector. The projects aim to develop new tools to reduce cyber risks and fortify energy systems, covering areas like attack prevention, vulnerability detection, and quantum communication. General Electric, EPRI, and several universities … Read more

Tips for a Successful SecOps Game Plan

October 19, 2023 at 02:04PM The ability to effectively utilize security data analytics is crucial for security operations teams. By continuously monitoring environments, teams can identify signs of compromise and prevent potential attacks. Collaboration between SecOps teams and IT is also enhanced with good data. However, the challenge lies in aggregating and analyzing data to … Read more

October 10, 2023 at 10:06AM – Old-School Attacks Are Still a Danger, Despite Newer Techniques

October 10, 2023 at 10:06AM Many cybercriminals still rely on non-sophisticated attacks because they are effective. These include phishing attacks and credential harvesting, often obtained through social engineering. Automation and AI are increasingly being used by bad actors to conduct attacks more efficiently. To defend against these attacks, organizations need to bolster human defenses through … Read more