• Apr, Tue, 2023
  • 2 minutes Read
Information Security and Cybersecurity: Understanding the Differences

In today’s digital age, information and cybersecurity are two essential concepts critical to any organization’s success and survival. While these two terms are often used interchangeably, there are some important differences between the two that are worth understanding. Information security is a broader concept encompassing all aspects of protecting information, whether it’s stored physically or digitally. It involves…

Read more
  • Apr, Tue, 2023
  • 1 minute Read
The Vulkan Files: Leaked Documents Reveal Cyber Weapons

Whistleblower leaks sensitive documents uncovering the development of offensive cyber tools, including those used in global cyber operations. #cybersecurity #leak A whistleblower has leaked sensitive documents related to the development of offensive cyber tools by NTC Vulkan, a Moscow-based IT contractor firm. The documents describe the development of hacking tools for not just Russian military and intelligence agencies…

Read more
  • Apr, Tue, 2023
  • 1 minute Read
CryptoClippy: Malware Targets Portuguese Crypto Wallets

A malware campaign called CryptoClippy has been discovered by Unit 42, which aims to steal cryptocurrency from legitimate users’ wallets by replacing their actual wallet address with a threat actor’s. The malware, known as a cryptocurrency clipper, monitors the victim’s clipboard for signs of cryptocurrency wallet addresses being copied. To deliver the malware, threat actors used Google Ads…

Read more
  • Apr, Tue, 2023
  • 1 minute Read
Beware of the Wi-Fi Queues: Researchers Find Ways to Bypass Wi-Fi Encryption

Researchers show how Wi-Fi encryption can be bypassed by manipulating transmit queues. Researchers from Belgium and the US have discovered that active adversaries may be able to shake loose queued-up network packets from some access points by manipulating transmit queues. The queued-up data was stored in decrypted form and was anticipated that it might need to be re-encrypted…

Read more
  • Apr, Fri, 2023
  • 3 minutes Read
ChatGPT: The Star Trek Computer Come to Life

The idea of a sentient computer capable of understanding and responding to human speech has been a popular topic in science fiction for decades. One such example is the character of “Computer” from the Star Trek franchise. While the concept of a sentient computer may have once seemed like pure fiction, today’s AI language models are bringing us…

Read more
  • Apr, Fri, 2023
  • 1 minute Read
Navigating the Seven Seas of Vulnerability Management: A Comprehensive Guide

The article discusses the seven stages of the vulnerability management lifecycle. The first step is consolidation, where centralizing the cyber risk data is necessary for complete visibility, duplicate data management, and better control. The second step is correlation, where vulnerability deduplication and clustering is essential for simplified scan data management, accurate risk understanding, and improved operating efficiency. The…

Read more
  • Apr, Thu, 2023
  • 1 minute Read
The Art of Selling Security: How to Convince Your CFO to Invest in Your Business’s Protection

The article provides a guide on how to propose a security investment to your CFO, addressing why it is challenging to pitch security to a CFO and what things the CFO wants to see. CFOs are busy people and managing budgets that seem to get smaller while the ask for spending becomes more frequent. The value a security investment brings to the organization is what CFOs generally look at when evaluating if something is “valuable” to their organization. These include reduced costs, reduced risks, increased productivity, and increased growth (mostly for revenue). The article provides a budget request template to make the ask even easier.

Read more
  • Apr, Thu, 2023
  • 1 minute Read
Exploring the Dark Side of ChatGPT: Uncovering the Malicious Use of AI

Checkpoint’s manager of threat intelligence, Sergey Shykevich, expressed concern about the malicious use of ChatGPT, an AI tool that can generate written content. Checkpoint conducted research to build a full malicious infection chain using OpenAI and discovered that cybercriminals have started using ChatGPT to build malicious tools. While ChatGPT is a great tool, Shykevich warns that it is important to specify exactly what you need and that ChatGPT code is far from perfect. Cybercriminals are still trying to understand how it works, and the generated code is rough. Nevertheless, Shykevich warns that ChatGPT combines code with the program, making it easier for cybercriminals to create malware using one interface.

Read more