Tag Archive for: Gaps

How AI can help close IoT’s growing security gaps to contain ransomware


VentureBeat presents: AI Unleashed – An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More


Nation-state attackers are fine-tuning their tradecraft to take advantage of unprotected IoT sensors essential to infrastructure and manufacturing and increasing their attacks against U.S. and European targets. Once-sporadic attacks have given way to an all-out assault on infrastructure and production plants.  

IoT attacks seek to take advantage of infrastructure and manufacturing organizations that don’t know how many sensors and endpoints they have, where they are, if they’re current on patches or if they’re secured. IT and security teams in a typical enterprise don’t know where up to 40% of their endpoints are. During Q2 2023, 70% of all ransomware attacks were aimed at the manufacturing sector, followed by industrial control systems (ICS) equipment and engineering (16%).

Unprotected gaps between operational technology (OT) and IT systems, along with unprotected ICS’, are soft targets. This past year, 75% of OT organizations experienced at least one breach intrusion.

More AI-based, tightly orchestrated cyberattacks coming

Well-funded nation-state attackers and criminal gangs are also recruiting AI and machine learning (ML) experts to help build the next generation of generative AI attack tools. Threat actors are orchestrating their IoT attacks with social engineering and reconnaissance and often know more about a target’s network than the admins do.  

Event

AI Unleashed

An exclusive invite-only evening of insights and networking, designed for senior enterprise executives overseeing data stacks and strategies.

 


Learn More

Manufacturing CISOs seeing spikes in nation-state attack attempts say that new tradecraft reflects a faster, more efficient attack strategy often combined with deepfakes and advanced social engineering. Cyberattacks reflect a new generation of technologies capable of adapting faster than any infrastructure or…

Source…

Cyber ​​Security Gaps Expose Latin Americans to Online Fraud | Technology | Cyber ​​Attacks | Investments | Cryptocurrencies | Scams |


Realizing she was out, Gabriella Batalha didn’t think much of it Instagram, It wasn’t until the next day that she discovered her account was full of ads Investments Inside Cryptocurrencies High performance.

The 27-year-old lawyer from Rio de Janeiro had to pay 200 reais (about US$40) to restore his account. “consultant” He says he found a guy on YouTube who might be a scammer. “It took me two days to recover my account and I was very stressed”He explained.

Patalha was not the only one. Online scams on the rise in Brazil 65% Last year, there were more than 200,000, according to data from the Brazilian Public Security Yearbook published last month.

Also Read: Application Loans: Three Precautions to Avoid Scams and Extortion

Across Latin America, online fraud and cyberattacks are “at an all-time high,” said cybersecurity firm Tenable, posing an urgent problem for the well-connected region.

Recent advances in technology inclusion in Latin America have created new opportunities for fraud, experts say, as the epidemic spurs a trend toward mobile banking and shopping using payment systems like Brazil’s most popular PIX.

The region is increasingly online. In 2022, the 77.9% Compared to Latin America and the Caribbean, people used the Internet 74.8% Above the previous year and world rate 66.3%According to the International Telecommunication Union (ITU).

According to a report by Internet security company Kaspersky, half of Latin American Internet users spend an average of six hours a day on social networks.

“Growing dependence on new technologies has made it easier for cybercriminals to attack more often”said Kerry-Ann Barrett, cybersecurity expert at the Organization of American States (OAS).

Threats are becoming more complex and costly, costing the region billions a year, Barrett noted.

In Peru, a gang defrauded a construction company of more than $62,000 by posing as a bank on a fake website, the attorney general’s office said.

In Mexico, fraudsters have targeted unsuspecting victims with fake job offers via text messages, prompting victims to share sensitive personal data, according to local press reports.

“Latin America is a priority target…

Source…

Ransomware attack at New York county tied to major cyber gaps



Officials at Suffolk County, New York, have disclosed that significant cybersecurity lapses have brought upon the major ransomware attack last September, which compromised nearly 500,000 residents’ …

Source…

HP Wolf Connect expands PC management to help close security gaps


HP has introduced HP Wolf Connect, a connectivity solution for IT management that offers a secure connection to remote PCs. This solution allows IT professionals to manage devices even when they are offline or turned off.

Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce. It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimize asset management.

“Hybrid work has made remote management at scale more complex, yet more essential,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “The cloud has helped but hasn’t solved IT’s ability to manage devices that are powered down or offline. HP Wolf Connect’s highly resilient connection opens new doors to remote device management, enabling efficient and effective management of dispersed workforces.”

HP Wolf Protect and Trace with Wolf Connect is a software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet. This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organizations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organization’s security posture. The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead.
  • 70% say that hybrid work increases the risk of lost or stolen devices.

“IT teams need a better way to deal with the increase in lost or stolen devices,” continues Pratt. “Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down.

Pratt continues; “This is particularly crucial in industries where devices may contain PII (personally identifiable information) or…

Source…