article thumbnail

How Generative AI Is Powering a New Era of Cybersecurity

Hacker's King

This comprehensive view allows security teams to anticipate and prepare for threats more effectively. Challenges and Risks of Generative AI in Cybersecurity While generative AI offers immense benefits, it also presents challenges: Dual-Use Technology Generative AI can be exploited by cybercriminals to: Create convincing phishing emails.

article thumbnail

When Accounts are "Hacked" Due to Poor Passwords, Victims Must Share the Blame

Troy Hunt

I just can't wrap my head around why anyone would think that people should be able to take whatever shortcuts they want with their personal security and somehow, magically, have absolutely no responsibility whatsoever for the outcome.

Passwords 274
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How JetBlue creates a culture of security

CSO Magazine

JetBlue’s 45-person security team has “a lot of territory to cover, both domestically and internationally,” says VP of Security Keith Slotter. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Sign up for CSO newsletters. ].

CSO 82
article thumbnail

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Cisco Security

The ever-present need to move quickly to stay ahead of cybercriminals require tools to “just work. ” Perimeter and internal defenses is not an “either-or” issue; it is an “and” issue —Firewalls have a prime vantage point, being able to observe all traffic traversing into and out of our infrastructure.

article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

The author critiques ‘anticipatory data practices’, a collection of techniques that include my own work, as presented to civil society activists. ” Her work, advances my thinking and concerns that I’ve had since our expriment with threat modeling the privacy of Seattle residents.

article thumbnail

The outstanding stealth of Operation Triangulation

SecureList

This action retrieves a list of files from the validator’s configuration (this list was empty for the validator configurations that we analyzed), checks if they are present in the file system and produces a list of found files as output. SQLite stealing modules Many apps on iOS use SQLite to store their internal data.

article thumbnail

4 Key Themes from Black Hat USA 2024

NetSpi Executives

Additionally, 30+ of our security experts, The NetSPI Agents , went to DEF CON 32 – three of whom presented sessions on Google cloud pentesting tools, mainframe security, and Azure insecurities. Scott Weston presented on GCPwn: a Python toolset for easy GCP pentesting and module creation.

CISO 52