article thumbnail

Black Hat AI Tools Fuel Rise in Business Email Compromise (BEC) Attacks

eSecurity Planet

ChatGPT and other generative AI tools have been used by cybercriminals to create convincing spoofing emails, resulting in a dramatic rise in business email compromise (BEC) attacks. They found a tool called WormGPT “through a prominent online forum that’s often associated with cybercrime,” Kelley wrote in a blog post.

article thumbnail

Cisco fixes a static default credential issue in Smart Software Manager tool

Security Affairs

Cisco has released security updates to address 17 vulnerabilities affecting its networking and unified communications product lines. Cisco has released security patches to fix 17 vulnerabilities affecting its networking and unified communications product lines. ” reads the advisory published by Cisco. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Linux Patch Management: Tools, Issues & Best Practices

eSecurity Planet

Here we’ll discuss how patch management works on Linux, best practices, and the best patch management tools for Linux. Each operating system has its own unique approach to patch management based on their underlying philosophies and target audiences. Manually updating each system can be tedious, complex and prone to human error.

Cloud 98
article thumbnail

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

Security agencies belonging to Five Eyes (United States, United Kingdom, Canada, Australia and New Zealand) have released a joint report that details some popular hacking tools. “In it we highlight the use of five publicly available tools, which have been used for malicious purposes in recent cyber incidents around the world.

article thumbnail

City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack

Security Affairs

Once obtained access to the City’s network, the group performed reconnaissance and information-gathering activities using legitimate third-party remote management tools. The Royal group began reconnaissance activity in April 2023, and the analysis of system log data dates the beginning of the surveillance operations on April 7, 2023.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

It covers seven security domains: security operations and administration; access controls ; risk identification, monitoring and analysis; incident response and recovery; cryptography ; network and communications security; and systems and application security. The 125-question exam takes up to 3 hours to complete.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue teams consist of security analysts, network engineers and system administrators. Red teams use intelligence on new and emerging threats as well as previous research on new attack techniques and offensive security tools. In larger teams, a purple team can serve as a communication channel between the blue and red teams.