Privilege escalation sounds scary. Have you heard about the new vulnerabilities in Google’s Vertex AI platform? A recent breach of these vulnerabilities involved LLMs (large language models). The attacker used privilege escalation to exploit a system running Google Vertex AI. This allowed them to mine and steal sensitive data that the AI had access to. […]
Hackers Catastrophic Breach Federal Court: What this Looming Threat Means
Imagine being a confidential informant in a federal criminal case and suddenly realizing that, thanks to a cyber breach, your name might now be in the hands of the very people you helped put away. That’s the nightmare scenario federal officials are dealing with after a sweeping cyberattack on the U.S. federal judiciary’s electronic case […]
Why You Should Never Pay Ransomware
Ransomware is one of the most rampant threats to our private data, and the damage to our systems can be catastrophic if we don’t have the proper cyber-defenses in place. Secure and reliable backup systems can be integral to recovering from such an attack. Unfortunately, the threat of damage, loss, or theft of your data […]
How to Outsmart Insider Threats
Insider threats are evolving in sophisticated ways, and they continue to pose significant risks to our workspaces today. Whether it’s a coworker forgetting to lock the drawer housing the most important contracts, a third-party vendor unknowingly bringing malware into the company network, or a threat actor posing as your IT guy to steal company secrets […]
Social Engineering Is Evolving to be Even More Tantalizing
Despite the leaps and bounds we’ve made in cyber security technology, social engineering (aka the human element) remains the most vulnerable link in the security chain. 95% of cyberattacks begin because of human error. People have emotional weaknesses that threat actors like to exploit. Social engineering attacks have skyrocketed in the past several years. What […]
Don’t Be Faked Out by Fake Websites
Phishing scammers reach out to us by email, but often, it’s the fake websites they try to send us to that are the real traps set for us. Some scammers set up fake websites that look and behave like legitimate sites. The goal varies; they may want you to give up your login information for […]