A Necessary Digital Odyssey of RPA and AI/ML at HUD

Credit to Author: David Chow| Date: Wed, 13 Mar 2024 00:00:00 +0000

Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.

Read more

Global Cybersecurity Trends: AI, Geopolitical Risks, and Zero Trust

Credit to Author: David Chow| Date: Tue, 13 Feb 2024 00:00:00 +0000

Trend Micro’s Chief Technology Strategy Officer discusses the biggest cybersecurity trends and what to watch for in 2024.

Read more

DarkGate Opens Organizations for Attack via Skype, Teams

Credit to Author: Trent Bessell| Date: Thu, 12 Oct 2023 00:00:00 +0000

We detail an ongoing campaign abusing messaging platforms Skype and Teams to distribute the DarkGate malware to targeted organizations. We also discovered that once DarkGate is installed on the victim’s system, additional payloads were introduced to the environment.

Read more

Attacks on 5G Infrastructure From Users’ Devices

Credit to Author: Salim S.I.| Date: Wed, 20 Sep 2023 00:00:00 +0000

Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed, efficiency, and productivity brought by 5G. This entry describes CVE-2021-45462 as a potential use case to deploy a denial-of-service (DoS) attack to private 5G networks.

Read more

The Journey to Zero Trust with Industry Frameworks

Credit to Author: Alifiya Sadikali| Date: Wed, 09 Aug 2023 00:00:00 +0000

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Read more

Zero Trust Frameworks for Industry

Credit to Author: Alifiya Sadikali| Date: Wed, 09 Aug 2023 00:00:00 +0000

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Read more

New SEC Cybersecurity Rules: What You Need to Know

Credit to Author: Greg Young| Date: Thu, 03 Aug 2023 00:00:00 +0000

The US Securities and Exchange Commission (SEC) recently adopted rules regarding mandatory cybersecurity disclosure. Explore what this announcement means for you and your organization.

Read more

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

Credit to Author: Matsukawa Bakuei| Date: Wed, 05 Jul 2023 00:00:00 +0000

Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.

Read more