article thumbnail

North Korea-linked APT37 exploited IE zero-day in a recent attack

Security Affairs

APT37 has been active since at least 2012 , it made the headlines in early February 2028, when researchers revealed that the APT group leveraged a zero-day vulnerability in Adobe Flash Player to deliver malware to South Korean users.

Internet 144
article thumbnail

News alert: IDT Corp., AccuKnox partner to deploy runtime security-powered CNAPP at the edge of IoT

The Last Watchdog

Gartners predictions for the Internet of Things (IoT) security landscape in 2025 highlight the impact of AI Agent Abuse Leading to Security Breaches: By 2028, Gartner forecasts that 25% of enterprise security breaches will be traced back to the misuse of AI agents by both external and internal malicious actors.

IoT 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI and the Future of Work: What It Means for Cybersecurity and Beyond

SecureWorld News

Gartner estimates that by 2028, more than 50% of SOC Level 1 analyst responsibilities will be handled by AI. Media, Content, and Design Timing: Now to 3 years Tools like ChatGPT, Midjourney, and Adobe Firefly are enabling content generation with minimal human input. That doesn't mean the human cybersecurity workforce is obsolete.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

At a high-level, these are the three main key milestones proposed by the NCSC: By 2028 Define the organizations migration goals. In the guidance, we describe the key steps in such a transition, and illustrate some of the cryptography and PQC-specific elements required at each stage of the programme, reads a companion blog.

Risk 68
article thumbnail

Trade Wars: How U.S. Tariffs Are Reshaping Cyber Risk and Resilience

SecureWorld News

billion by 2028. There has been a marked increase over the last few years of nation-state threat actors searching the internet and social media platforms looking for disgruntled employees who are complaining about their job. "The Mexican cybersecurity market has actually been quite lucrative for U.S. cybersecurity vendors.

article thumbnail

US Election 2024 – FBI warning about fake election videos

Security Affairs

The video, which began circulating on social media this week, shows two men who claim they arrived to the U.S. Social media can create echo chambers where users are exposed primarily to information that reinforces their existing beliefs. from Haiti six months ago. Accounts under the name Kamala Harris were also offered for sale.

article thumbnail

AI's not the only hot tech trend - check out the year's other 11, according to McKinsey

Zero Day

  Also: How AI agents can generate $450 billion by 2028 - and what stands in the way In the firm's latest report , published Tuesday, artificial intelligence ranked at the top of the list (for a number of reasons, which we'll get into below).