Sophistication of AI-Backed Operation Targeting Senator Points to Future of Deepfake Schemes

September 27, 2024 at 08:03AM Sen. Cardin was targeted in a sophisticated deepfake operation, where a caller posing as a former Ukrainian official engaged in a video call to gather politically charged information. Experts believe advances in generative AI have made such schemes more believable and easier to conduct. Officials warn of more attempts in … Read more

GenAI in Cybersecurity: Insights Beyond the Verizon DBIR

September 20, 2024 at 10:04AM The Verizon “Data Breach Investigations Report” (DBIR) is a highly credible annual report providing valuable insights into data breaches and cyber threats. The 2024 report raised questions about the role of generative AI in cyberattacks in contrast to the findings. Six use cases of generative AI in cybercrime were highlighted, … Read more

Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers

April 25, 2024 at 09:40AM Experts emphasize the threat of state-sponsored cybercriminals meddling in the upcoming US presidential election and the UK’s next general election. Mandiant’s report highlights the likely tactics, such as DDoS attacks, data theft, disinformation, and deepfakes, and identifies Russia, China, Iran, and North Korea as the primary adversaries. These nations have … Read more

Deepfake-Generating Apps Explode, Allowing Multimillion-Dollar Corporate Heists

February 5, 2024 at 05:28PM Deepfake creation software is rapidly spreading on the Dark Web, leading to an increase in AI-assisted financial fraud. In a recent incident, a Hong Kong-based employee fell victim to a deepfake scam, resulting in $25.5 million in fraudulent transactions. The availability of sophisticated deepfake tools poses a significant challenge for … Read more

8 Strategies for Defending Against Help Desk Attacks

December 21, 2023 at 01:08PM Security strategies often lag behind offensive attack tactics, leaving companies vulnerable to evolving threats. The help desk is particularly at risk, as cybercriminals target it to gain network access. Many companies lack robust validation procedures for help desk requests, making them susceptible to social engineering attacks. Strong security measures are … Read more