article thumbnail

5 most dangerous new attack techniques

CSO Magazine

The five emerging cyber-attack vectors the speakers covered were adversarial AI, ChatGPT-powered social engineering, third-party developer, SEO, and paid advertising attacks. To read this article in full, please click here

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

If I go to a CSO and say, ‘We can secure your APIs,’ he’ll say, ‘Great, can you also find them for me?’ ” observed Dwivedi, Data Theorem’s founder. A dozen or more additional APIs come into play to activate each mobile app on a phone, so one handset alone typically relies on hundreds of APIs to fully function. And that’s just one phone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guerrilla malware is preinfected on 8.9 million Android devices, Trend Micro says

CSO Magazine

The infection turns these devices into mobile proxies, tools for stealing and selling SMS messages, social media and online messaging accounts and monetization via advertisements and click fraud," Trend Micro researchers said in a report presented at the BlackHat Asia conference this week. To read this article in full, please click here

Malware 119
article thumbnail

Cybercrime escalates as barriers to entry crumble

CSO Magazine

In an analysis of 174 exploits advertised on the dark web, HP Wolf researchers found an overwhelming number (91%) were selling for less than $10. It found that competition in the underground has driven down the price of malicious tools, making them affordable to anyone.

article thumbnail

Hard-to-detect malware loader distributed via AI-generated YouTube videos

CSO Magazine

The Aurora infostealer is written in Go and is operated as a malware-as-a-service platform that's advertised on Russian-language cybercrime forums. The loader uses anti-virtual-machine (VM) and unusual compilation techniques that seem to make it quite successful at avoiding detection by security solutions.

Malware 120
article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso.

CISO 125
article thumbnail

Experts explained how to hack macs in enterprises through MDM

Security Affairs

A security duo composed by Jesse Endahl, CPO and CSO at macOS management firm Fleetsmith, and Max Bélanger, staff engineer at Dropbox, demonstrated at the Black Hat security conference how a persistent attacker could compromise brand new Mac systems in enterprise environments on the first boot. .” Pierluigi Paganini.

Hacking 70