article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance. The script to do that was written by ChatGPT.

InfoSec 137
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

Chris and I talk about how organizations that manage OT – including critical infrastructure owners – are being targeted by sophisticated cyber actors and the strategies best suited to manage increased cyber risks to OT environments.

CSO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Preventing Critical Email Attacks: Brian Krebs and Mike Britton Discuss

SecureWorld News

Key takeaway #3: Social engineering is the most powerful attack vector against InfoSec protocols. Social engineering, as it's called, has always been the most powerful part of InfoSec, or the lack of InfoSec, in any organization.".

InfoSec 74
article thumbnail

Personal Cybersecurity Concerns for 2023

Security Through Education

More than 90% of successful cyber-attacks start with a phishing email. Most if not, all social engineering attacks will attempt to trigger some emotion such as urgency, fear, greed, or curiosity. At Social-Engineer LLC, our purpose is to bring education and awareness to all users of technology.

article thumbnail

What happened in the Twitch Breach…

Security Boulevard

This will lower your risks of complete system compromise during an attack. Cyber attacks do not happen within a few hours or even a few days. Attackers often need time to explore the network and construct suitable strategies to fully exploit the system and steal the data it contains.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

She is an impressive force within the infosec world. Crawley: Pen testing is when you simulate cyber attacks, so you're not actually conducting cyber attacks because you have the consent of the owner of the network or the computer application that you're penetration testing, but within the rules that your client has given you.

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

She is an impressive force within the infosec world. Crawley: Pen testing is when you simulate cyber attacks, so you're not actually conducting cyber attacks because you have the consent of the owner of the network or the computer application that you're penetration testing, but within the rules that your client has given you.