article thumbnail

BSidesTLV 2023 – Andy Ellis – Hacking Harry Potter: The Untold Story Of Fantastical Social Engineering

Security Boulevard

Permalink The post BSidesTLV 2023 – Andy Ellis – Hacking Harry Potter: The Untold Story Of Fantastical Social Engineering appeared first on Security Boulevard. Many thanks to BSidesTLV for publishing their presenter’s erudite BSidesTLV 2023 security content on the organizations’ YouTube channel.

article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This past year set a profound stage, from the advent of stringent cyber regulations to the convergence of generative AI, social engineering, and ransomware. Last year, we witnessed the fast-evolving nature of social engineering attacks, and this evolution poses greater challenges for detection and defense.

CISO 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Cyberattacks and data breaches will continue to arise because of credential theft, social engineering (phishing, smishing, vishing etc), vulnerabilities in third party software and supply chain processes, forged or stolen machine identities, and misconfigured cloud computing. Here are my predictions for 2023. Types of attacks.

article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals. Explore IoT security architectures, protocols, and solutions for securing interconnected devices.

article thumbnail

Zoom Security Issues Are a Wakeup Call for Enterprises

eSecurity Planet

The sharp increase in demand put a focus on security shortcomings in Zoom’s architecture – “Zoombombing” became a thing – that the company was quick to address. A little more than a week later, cybersecurity firm Armorblox outlined an account takeover attack that leveraged malicious phishing and social engineering.

article thumbnail

ENISA 2023 Threat Landscape Report: Key Findings and Recommendations

Thales Cloud Protection & Licensing

Attackers exploit the geopolitical environment and use AI-powered tools to create convincing deepfakes, disinformation campaigns, and social engineering attacks. The report notes that these attacks can have significant implications for democratic processes, social cohesion, and national security.

article thumbnail

Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns

SecureWorld News

The social engineering tactics are highly tailored to build trust before delivering sophisticated malware. Robust security awareness and architecture will be the lights to counter looming threats before damage is done. Follow SecureWorld News for more stories related to cybersecurity.