report

Customizing LLMs for domain-specific tasks

Customizing LLMs for domain-specific tasks 28/08/2023 at 06:02 By Help Net Security The expansion of large language models (LLMs) in recent times has brought about a revolutionary change in machine learning processes and has introduced fresh perspectives on the potential of AI, according to Predibase. Based on survey data from organizations experimenting with LLMs, researchers […]

React to this headline:

Loading spinner

Customizing LLMs for domain-specific tasks Read More »

Ransomware dwell time hits new low

Ransomware dwell time hits new low 25/08/2023 at 06:34 By Help Net Security Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks during the first half of 2023, according to Sophos. In 2022, the median

React to this headline:

Loading spinner

Ransomware dwell time hits new low Read More »

Unrealistic expectations exacerbate the cybersecurity talent shortage

Unrealistic expectations exacerbate the cybersecurity talent shortage 25/08/2023 at 06:05 By Help Net Security Consumers believe today’s cybersecurity talent shortage is in large part due to limited exposure to the profession and a lack of cybersecurity education and training at a younger age within school systems, according to ThreatX. 90% of consumers polled say they

React to this headline:

Loading spinner

Unrealistic expectations exacerbate the cybersecurity talent shortage Read More »

Lack of visibility into cloud access policies leaves enterprises flying blind

Lack of visibility into cloud access policies leaves enterprises flying blind 24/08/2023 at 06:00 By Help Net Security Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not know where applications are deployed and who has access to them, according to Strata Identity. Cloud security

React to this headline:

Loading spinner

Lack of visibility into cloud access policies leaves enterprises flying blind Read More »

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals turn to AI to bypass modern email security measures 23/08/2023 at 06:31 By Help Net Security Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterman Research. AI’s role

React to this headline:

Loading spinner

Cybercriminals turn to AI to bypass modern email security measures Read More »

Large-scale breaches overshadow decline in number of healthcare data incidents

Large-scale breaches overshadow decline in number of healthcare data incidents 23/08/2023 at 06:04 By Help Net Security While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed by large-scale breaches resulting in a significant increase in the number of individuals affected, which reached record levels,

React to this headline:

Loading spinner

Large-scale breaches overshadow decline in number of healthcare data incidents Read More »

Organizations invest in AI tools to elevate email security

Organizations invest in AI tools to elevate email security 21/08/2023 at 06:39 By Help Net Security To counteract new and emerging threat methods enhanced by artificial intelligence, specialized email security vendors are leveraging a synergy of AI and human insights to enhance email security, according to IRONSCALES and Osterman Research. Cybercriminals are already using AI

React to this headline:

Loading spinner

Organizations invest in AI tools to elevate email security Read More »

30% of phishing threats involve newly registered domains

30% of phishing threats involve newly registered domains 18/08/2023 at 05:31 By Help Net Security Phishing remains the most dominant and fastest growing internet crime, largely due to the ubiquity of email and the ceaseless issue of human error that is preyed upon by today’s threat actors, according to Cloudflare. While business email compromise (BEC)

React to this headline:

Loading spinner

30% of phishing threats involve newly registered domains Read More »

Federal agencies gear up for zero trust executive order deadline

Federal agencies gear up for zero trust executive order deadline 18/08/2023 at 05:04 By Help Net Security Federal agencies are prepared to meet the zero trust executive order requirements from the Biden Administration with just over a year until the deadline, according to Swimlane. The research investigated the confidence level of these agencies in meeting

React to this headline:

Loading spinner

Federal agencies gear up for zero trust executive order deadline Read More »

Heavy workloads driving IT professionals to resign

Heavy workloads driving IT professionals to resign 17/08/2023 at 06:32 By Help Net Security A quarter of IT professionals are seriously contemplating leaving their current jobs within the next six months, potentially costing US companies upwards of 145 billion dollars, according to Ivanti. These statistics highlight the pressing need for organizations to relieve the burden

React to this headline:

Loading spinner

Heavy workloads driving IT professionals to resign Read More »

Navigating generative AI risks and regulatory challenges

Navigating generative AI risks and regulatory challenges 14/08/2023 at 06:33 By Help Net Security The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023, according to Gartner. A benchmarked view of emerging risks “Generative AI was the second

React to this headline:

Loading spinner

Navigating generative AI risks and regulatory challenges Read More »

Threat intelligence’s key role in mitigating malware threats

Threat intelligence’s key role in mitigating malware threats 11/08/2023 at 07:02 By Help Net Security Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence Threat actors leverage malware as an initial foothold to infiltrate targeted infrastructures and

React to this headline:

Loading spinner

Threat intelligence’s key role in mitigating malware threats Read More »

How executives’ personal devices threaten business security

How executives’ personal devices threaten business security 11/08/2023 at 06:02 By Help Net Security Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to Agency. Yet, while the cyber threat landscape has seen this major shift, security software to

React to this headline:

Loading spinner

How executives’ personal devices threaten business security Read More »

Private network adoption grows as enterprises seek greater control and security

Private network adoption grows as enterprises seek greater control and security 10/08/2023 at 06:04 By Help Net Security Enterprises are turning to private networks to enhance security and resiliency, according to Spirent. “Private networks are emerging as a viable alternative to traditional enterprise networks, offering a wide range of benefits,” said Spirent’s principal strategist for

React to this headline:

Loading spinner

Private network adoption grows as enterprises seek greater control and security Read More »

37% of third-party applications have high-risk permissions

37% of third-party applications have high-risk permissions 10/08/2023 at 05:32 By Help Net Security Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, underscoring the proliferation of an emerging

React to this headline:

Loading spinner

37% of third-party applications have high-risk permissions Read More »

Recent ransomware attacks share curiously similar tactics

Recent ransomware attacks share curiously similar tactics 09/08/2023 at 12:33 By Industry News A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings into the connections between the most prominent ransomware groups this past year, including Royal, in its Clustering Attacker Behavior Reveals Hidden Patterns

React to this headline:

Loading spinner

Recent ransomware attacks share curiously similar tactics Read More »

Data exfiltration is now the go-to cyber extortion strategy

Data exfiltration is now the go-to cyber extortion strategy 09/08/2023 at 06:32 By Help Net Security The abuse of zero-day and one-day vulnerabilities in the past six months led to a 143% increase in victims when comparing Q1 2022 with Q1 2023, according to Akamai. Ransomware groups target the exfiltration of files The report also

React to this headline:

Loading spinner

Data exfiltration is now the go-to cyber extortion strategy Read More »

The ransomware rollercoaster continues as criminals advance their business models

The ransomware rollercoaster continues as criminals advance their business models 09/08/2023 at 06:02 By Help Net Security Ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023 as a proportion of all malware detections, according to Fortinet. Ransomware detections 1H 2023 FortiGuard Labs has documented substantial

React to this headline:

Loading spinner

The ransomware rollercoaster continues as criminals advance their business models Read More »

Seasoned cyber pros are more complacent in their skills than junior staff

Seasoned cyber pros are more complacent in their skills than junior staff 08/08/2023 at 06:46 By Help Net Security Average response time accelerated from 29 to 19 days, from 2021 to 2022, with lessons from Log4j and other high-profile vulnerabilities having a significant impact on urgency levels, according to Immersive Labs. Faster response time to

React to this headline:

Loading spinner

Seasoned cyber pros are more complacent in their skills than junior staff Read More »

Managing human cyber risks matters now more than ever

Managing human cyber risks matters now more than ever 08/08/2023 at 06:01 By Help Net Security As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital, according to the SANS Institute. The report underscores the escalating stakes in human cyber risks,

React to this headline:

Loading spinner

Managing human cyber risks matters now more than ever Read More »

Scroll to Top