article thumbnail

Where Does ChatGPT Fall on Your Cyber Risk Register?

SecureWorld News

So it's fitting that a recent SecureWorld webcast, sponsored by Spirion, tackles the topic of "Does ChatGPT Belong on Your Cyber Risk Register? Malware generation: ChatGPT's ability to generate malware can be misused to create malware that can infect an organization's systems, disrupt operations, or steal sensitive data.

article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

In fact, all of their other concerns—malware, stolen data, phishing, ransomware and misconfiguration of cloud services—include an element of human error and/or malice. The study also found that 49% of IT business leaders count human error, including those by employees, among their top security concerns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft disables macros to curtail Malware Cyber Attacks

CyberSecurity Insiders

Microsoft has made it official that it has disabled macros across its office products to block malware cyber attacks. The post Microsoft disables macros to curtail Malware Cyber Attacks appeared first on Cybersecurity Insiders.

article thumbnail

Annual Reports: How They Warn of Cyber Risk

SecureWorld News

However, we were most interested in seeing how Accenture articulated a particular business risk: the risk from a cyberattack. On page 34 of the report, Accenture dives into the risk that cyber poses to the business. L egal, reputational and financial risks? That's where the fine print comes in.

article thumbnail

The March Madness Cyber Threat

Adam Levin

Unfortunately, brackets create opportunities for a wide array of phishing and hacking campaigns, particularly in workplaces where a lot of brackets are distributed. March Madness brackets are a reliable delivery method for hackers to deliver malware. The outcome of over 60 games is wagered on through shared files or online services. .

article thumbnail

GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risks

The Last Watchdog

For instance, phishing, one of the most common, is a social engineering attack used to steal user data. 2021 saw a massive increase in phishing attacks , and that trend has continued into 2022. With the rise in social media, criminals have more platforms with which to target potential phishing victims.

Risk 203
article thumbnail

Report: 67% of Organizations Experienced a Breach in Last 2 Years

SecureWorld News

Key findings from Critical Start's report include: Phishing attacks leveraging Quick Response (QR) codes are on the rise, with bad actors masquerading as Microsoft security notifications with a QR code embedded inside a PNG image or a PDF attachment. critical infrastructure.