article thumbnail

Catches of the Month: Phishing Scams for May 2023

IT Governance

Another ChatGPT threat vector emerges Since the emergence of ChatGPT last year, IT Governance has covered the cyber security implications it’s having in comprehensive detail. For example, one bogus site purports to offer ‘ChatGPT detectors’ that help people spot content that has been artificially generated.

article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 10 August. Cybereason’s researchers recently set up a honeypot environment with a network architecture that replicated that of “typical power substation” and waited. Here are this week’s stories. This asset was then, it seems, listed for sale on the xDedic black market.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EUROPE: Data protection regulators publish myth-busting guidance on machine learning

DLA Piper Privacy Matters

For example, the ML system could be used to determine likely trends of categories of persons to default on loan agreements through the processing of financial default information. For example: How is the data interpreted? The specific form and function of an ML system depends on the tasks it is intended to complete.

article thumbnail

Malware Training Sets: FollowUP

Security Affairs

For example for i in */.json; During my PhD program I worked for US Government (@ National Institute of Standards and Technology, Security Division) where I did intensive researches in Malware evasion techniques and penetration testing of electronic voting systems. The mist_json.py

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

So you've got auto scaling groups, or like virtual machines and kind of easy to use this as an example, your containerization as well instead of list environments, where again, you're only kind of using the resources you need. So you might see there is a suspicious login as an example. This is great. This is how you should use it.

Cloud 40
article thumbnail

APT Attacks & Prevention

eSecurity Planet

Threat groups have been tolerated in Russia, for example, in exchange for assurances that their hacking activity will be conducted in other countries. APT Examples. While APTs use various means to execute these stages, we can observe recent examples to understand the wide variety of attacks, creative techniques, and varied goals.

Access 107
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

or specialized tools to deliver obfuscation defenses such as: Honeypots: Provide tempting targets for attackers that contain no valid information as one of several similar deception technologies to trigger alerts for early attack detection. These techniques can use built-in software features (for firewalls, operating systems, etc.)

Security 106