Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
CISOs Increasingly Concerned About Mobile Threats

CISOs Increasingly Concerned About Mobile Threats

A new warning from Verizon about the rise of smishing, spam text messages and text scams and the FBI reporting $10.3 billion in internet fraud last year, CISOs are increasingly concerned about ...
SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

The United Parcel Service (UPS) says fraudsters have been harvesting phone numbers and other information from its online shipment tracking tool in Canada to send highly targeted SMS phishing (a.k.a. "smishing") messages ...
CNN reporter calls his parents using an AI deepfake voice. Watch what happens next

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning ...
Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information on these ...
converged, identity Permiso PAM, cybersecurity, credentials, identity, security, credentials authorization PAM governance digital identity IAM authorization

Permiso Discovers Smishing Attack to Steal AWS Credentials

Permiso, a provider of a platform for correlating IT events to identities, today disclosed the discovery of an attack through which cybercriminals are employing text messages to steal credentials that enable them ...
Security Boulevard
SMiShing Testing and Policy

SMiShing Testing and Policy: Update it Today!

For years, we have known about phishing as an effective vector into corporate networks. Malicious actors use phishing to obtain […] ...
Social Engineering and Healthcare

Social Engineering and Healthcare

Social engineering has become a larger threat to the healthcare industry in recent years. So much so that the Federal […] ...