email cyber, resilience, Dell Lacework Adds Time Series Modeling to Cybersecurity Platform

A Look at the Email Threat Landscape in Q1 2023

VIPRE's Email Threat Trends Report for Q1 2023 analyzed 1.8 billion emails to provide a comprehensive understanding of contemporary email threats ...
Security Boulevard
How Social Engineering works

Psychological Manipulation in Social Engineering: Unveiling the Tactics

Have you ever found yourself in a situation where you felt like someone was trying to manipulate you into doing something you didn’t want to do? Perhaps it was a friend, family ...
Special report: Fighting fraud in the age of AI and automation

Special report: Fighting fraud in the age of AI and automation

See findings from Sift’s Q2 2023 Digital Trust & Safety Index, which includes data and insights on how AI and automation are changing the scope of fraud. The post Special report: Fighting ...
Vishing breaking down social engineering techniques

Vishing: Breaking Down Social Engineering Techniques

If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ...
Sowing Chaos and Reaping Rewards in Confluence and Jira

Sowing Chaos and Reaping Rewards in Confluence and Jira

IntroductionLet me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
CNN reporter calls his parents using an AI deepfake voice. Watch what happens next

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning ...
P2PInfect network security, phishing, ChatGPT, AI, identity, hacking, AI, Chat GPT, ChatGPT malware threat ransomware CNA REvil EtterSilent ransomware dark web

When ChatGPT Goes Phishing

ChatGPT has become a powerful tool for security professionals seeking to enrich their work. However, its widespread use has raised concerns about the potential for bad actors to misuse the technology. Experts ...
Security Boulevard