article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

Unmanaged devices consist of any device that connects to the network, cloud resources, or other assets without corporate-controlled security. Secure web gateways (SWG) can sometimes inspect traffic and potentially detect increased and anomalous traffic. Attackers probably use BYOD and the research indirectly supports this.

article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

Vendors and researchers disclosed a wide range of vulnerabilities this week from common Cisco IOS, Fortinet, and Windows Server issues to more focused flaws affecting developers (PyPI), artificial intelligence (Ray, NVIDIA), and industrial controls (Rockwell Automation).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Steganography Allows Attackers to Evade Detection

eSecurity Planet

In cybersecurity, steganography mainly consists of hiding malicious payloads or secret information inside seemingly harmless files such as images, PDFs, audios, videos, and many other document types. More sophisticated approaches may now involve artificial intelligence to create steganographic images using adversarial training.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the year’s events and try to predict next year’s trends. After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends. Bottom line: Prepare now based on risk.

article thumbnail

ShadowRay Vulnerability: 6 Lessons for AI & Cybersecurity

eSecurity Planet

ShadowRay is an exposure of the Ray artificial intelligence (AI) framework infrastructure. The dispute between Ray’s developers and security researchers highlights hidden assumptions and teaches lessons for AI security, internet-exposed assets, and vulnerability scanning through an understanding of ShadowRay.

article thumbnail

2019 Recap: A Year to Remember

McAfee

Working Even Harder To End the Cybersecurity Talent Shortage. The term “skills gap” is all too familiar to those in the cybersecurity industry. The Release of The Cybersecurity Playbook. 12 th Annual MPOWER Cybersecurity Summit. First Cybersecurity Company to Achieve Global Gender Pay Parity.

article thumbnail

Spear Phishing Prevention: 10 Ways to Protect Your Organization

eSecurity Planet

Clearing Tracks Advanced attackers can also take steps to erase traces of their activities, which makes it more difficult for cybersecurity experts to identify and respond to a breach. social engineering tactics and strange sender behaviors), they also use artificial intelligence algorithms. Read more: What is Network Security?