Tag: corporate
-
Copilot diagrams could leak corporate emails via indirect prompt injection
The bigger threat of indirect prompt injection: The incident underscores that the risk goes beyond simple “prompt injection,” where a user types malicious instructions directly into an AI. Here, the attacker hides instructions inside document content that gets passed into the assistant without the user’s awareness. Logue described how the hidden instructions use progressive task…
-
Step aside, SOC. It’s time to ROC
Tags: attack, breach, business, communications, corporate, cyber, cybersecurity, data, defense, exploit, finance, framework, government, infrastructure, insurance, intelligence, military, monitoring, network, resilience, risk, risk-assessment, soc, strategy, threat, vpn, vulnerability, zero-dayWhat is a ROC?: At its core, the Resilience Risk Operations Center (ROC) is a proactive intelligence hub. Think of it as a fusion center in which cyber, business and financial risk come together to form one clear picture.While the idea of a ROC isn’t entirely new, versions of it have existed across government and…
-
Step aside, SOC. It’s time to ROC
Tags: attack, breach, business, communications, corporate, cyber, cybersecurity, data, defense, exploit, finance, framework, government, infrastructure, insurance, intelligence, military, monitoring, network, resilience, risk, risk-assessment, soc, strategy, threat, vpn, vulnerability, zero-dayWhat is a ROC?: At its core, the Resilience Risk Operations Center (ROC) is a proactive intelligence hub. Think of it as a fusion center in which cyber, business and financial risk come together to form one clear picture.While the idea of a ROC isn’t entirely new, versions of it have existed across government and…
-
Do CISOs need to rethink service provider risk?
Tags: access, ai, breach, ciso, compliance, control, corporate, cyber, cybersecurity, data, framework, governance, group, guide, incident, incident response, ISO-27001, penetration-testing, risk, risk-assessment, risk-management, service, soc, technology, threat, tool, training, update, vulnerabilityShould risk assessment be about questionnaires or conversation?: David Stockdale, director of cybersecurity at the University of Queensland (UQ), needs services providers to understand the make-up and complexity of a higher education institution.”Because of the size and research intensity of the university, we tend to build a lot in-house. Where we do use service providers,…
-
Do CISOs need to rethink service provider risk?
Tags: access, ai, breach, ciso, compliance, control, corporate, cyber, cybersecurity, data, framework, governance, group, guide, incident, incident response, ISO-27001, penetration-testing, risk, risk-assessment, risk-management, service, soc, technology, threat, tool, training, update, vulnerabilityShould risk assessment be about questionnaires or conversation?: David Stockdale, director of cybersecurity at the University of Queensland (UQ), needs services providers to understand the make-up and complexity of a higher education institution.”Because of the size and research intensity of the university, we tend to build a lot in-house. Where we do use service providers,…
-
OpenAI goes after Microsoft 365 Copilot’s lunch with ‘company knowledge’ feature
ChatGPT can now rummage through corporate files via connectors, though Redmond still has the deeper hooks First seen on theregister.com Jump to article: www.theregister.com/2025/10/24/openai_chatgpt_company_knowledge/
-
Manipulating the meeting notetaker: The rise of AI summarization optimization
Tags: access, ai, corporate, defense, detection, guide, risk, risk-assessment, strategy, supply-chain, tool, vulnerability“The main factor in last quarter’s delay was supply chain disruption.””The key outcome was overwhelmingly positive client feedback.””Our takeaway here is in alignment moving forward.””What matters here is the efficiency gains, not the temporary cost overrun.”The techniques are subtle. They employ high-signal phrases such as “key takeaway” and “action item,” keep statements short and clear,…
-
Manipulating the meeting notetaker: The rise of AI summarization optimization
Tags: access, ai, corporate, defense, detection, guide, risk, risk-assessment, strategy, supply-chain, tool, vulnerability“The main factor in last quarter’s delay was supply chain disruption.””The key outcome was overwhelmingly positive client feedback.””Our takeaway here is in alignment moving forward.””What matters here is the efficiency gains, not the temporary cost overrun.”The techniques are subtle. They employ high-signal phrases such as “key takeaway” and “action item,” keep statements short and clear,…
-
CAASM and EASM: Top 12 attack surface discovery and management tools
Tags: access, ai, api, attack, automation, blockchain, business, cloud, control, corporate, credentials, cyber, cybersecurity, dark-web, data, data-breach, detection, dns, endpoint, exploit, framework, guide, hacking, HIPAA, incident response, infrastructure, intelligence, Internet, leak, marketplace, microsoft, monitoring, network, open-source, PCI, risk, risk-assessment, service, soc, software, supply-chain, technology, threat, tool, update, vulnerabilityCAASM and EASM tools for attack surface discovery and management: Periodic scans of the network are no longer sufficient for maintaining a hardened attack surface. Continuous monitoring for new assets and configuration drift are critical to ensure the security of corporate resources and customer data.New assets need to be identified and incorporated into the monitoring…
-
AI-enabled ransomware attacks: CISO’s top security concern, with good reason
Ransomware’s AI-powered future: Although CrowdStrike’s latest survey doesn’t provide a full picture of AI’s use by ransomware gangs, the fact that generative AI is proving highly effective in crafting phishing emails that lead to ransomware infections shows the tip of the iceberg CISOs face.CrowdStrike Field CTO Cristian Rodriguez tells CSO, “We’re seeing AI touch every…
-
Is Your Car a BYOD Risk? Researchers Demonstrate How
If an employee’s phone connects to their car and then their corporate network, an attack against the car can reach the company. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/car-byod-risk
-
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws
Tags: access, attack, authentication, breach, china, control, corporate, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, flaw, framework, government, group, hacker, identity, infrastructure, intelligence, Intruder, korea, microsoft, monitoring, network, ransomware, reverse-engineering, risk, russia, supply-chain, tactics, technology, theft, threat, vulnerability, zero-day, zero-trustChina or Russia? Conflicting attribution: Microsoft attributed the broader wave of SharePoint exploitations to three Chinese-linked groups: Linen Typhoon, Violet Typhoon, and a third actor it tracks as Storm-2603. The company said the attackers were preparing to deploy Warlock ransomware across affected systems.However, the source familiar with the Kansas City incident tells CSO that a…
-
Cybersecurity Snapshot: F5 Breach Prompts Urgent U.S. Gov’t Warning, as OpenAI Details Disrupted ChatGPT Abuses
Tags: ai, attack, awareness, backdoor, breach, business, chatgpt, china, cisa, cloud, control, corporate, cve, cyber, cybersecurity, data, data-breach, defense, detection, exploit, framework, fraud, governance, government, group, hacker, incident, infrastructure, Internet, iran, law, LLM, malicious, malware, mitigation, monitoring, network, openai, organized, phishing, privacy, resilience, risk, russia, scam, security-incident, service, software, strategy, supply-chain, technology, threat, training, update, vulnerabilityF5’s breach triggers a CISA emergency directive, as Tenable calls it “a five-alarm fire” that requires urgent action. Meanwhile, OpenAI details how attackers try to misuse ChatGPT. Plus, boards are increasing AI and cyber disclosures. And much more! Key takeaways A critical breach at cybersecurity firm F5, attributed to a nation-state, has triggered an urgent…
-
TDL 007 – Cyber Warriors Digital Shadows: Insights from Canada’s Cybersecurity Leader
Tags: ai, awareness, backup, breach, browser, business, cio, ciso, communications, conference, control, corporate, country, cryptography, cyber, cybersecurity, dark-web, data, data-breach, defense, dns, email, encryption, finance, government, healthcare, identity, incident, infrastructure, intelligence, Internet, jobs, law, leak, linux, malicious, mfa, mitigation, network, organized, phone, privacy, ransom, ransomware, RedTeam, resilience, risk, risk-management, router, service, startup, strategy, supply-chain, switch, tactics, technology, theft, threat, tool, training, windowsSummary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), Khoury shares how a coincidental job application blossomed into a lifelong passion for national security. Khoury emphasizes that modern…
-
AI Agent Security: Whose Responsibility Is It?
The shared responsibility model of data security, familiar from cloud deployments, is key to agentic services, but cybersecurity teams and corporate users often struggle with awareness and managing that risk. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/ai-agent-security-awareness-responsibility
-
Attackers Exploit Zendesk Authentication Issue to Flood Targets’ Inboxes with Corporate Notifications
Cybercriminals have discovered a gap in Zendesk’s ticket submission process and are using it to bombard victims with waves of misleading support messages. When configured to accept anonymous requests, however, the service can be abused to generate email floods that appear to come from legitimate corporate domains. Earlier this week, security blogger Brian Krebs was…
-
Mango says some customer information exposed in cyber incident
Spain-based fashion chain Mango reported a data breach that exposed customer information but did not appear to affect internal corporate systems. First seen on therecord.media Jump to article: therecord.media/mango-fashion-retaier-data-breach
-
Mango says some customer information exposed in cyber incident
Spain-based fashion chain Mango reported a data breach that exposed customer information but did not appear to affect internal corporate systems. First seen on therecord.media Jump to article: therecord.media/mango-fashion-retaier-data-breach
-
BlackSuit Ransomware Breaches Corporate Network Using Single Compromised VPN Credential
Tags: access, attack, breach, corporate, credentials, cyber, cybercrime, encryption, group, network, ransomware, threat, vpnA major manufacturing company fell victim to a swift and devastating ransomware attack after threat actors gained access using just one set of stolen VPN credentials. The attack, carried out by the cybercrime group Ignoble Scorpius, culminated in widespread encryption of virtual machines and brought critical operations to a halt. The Initial Compromise The breach…
-
BlackSuit Ransomware Breaches Corporate Network Using Single Compromised VPN Credential
Tags: access, attack, breach, corporate, credentials, cyber, cybercrime, encryption, group, network, ransomware, threat, vpnA major manufacturing company fell victim to a swift and devastating ransomware attack after threat actors gained access using just one set of stolen VPN credentials. The attack, carried out by the cybercrime group Ignoble Scorpius, culminated in widespread encryption of virtual machines and brought critical operations to a halt. The Initial Compromise The breach…
-
Unencrypted satellites expose global communications
Researchers found nearly half of geostationary satellites leak unencrypted data, exposing consumer, corporate, and military communications. A group of researchers from UC San Diego and the University of Maryland found nearly half of geostationary satellites transmit unencrypted data, exposing sensitive consumer, corporate, and military communications to interception. The researchers used an $800 satellite receiver for…
-
13 cybersecurity myths organizations need to stop believing
Tags: access, ai, attack, authentication, backup, banking, breach, business, ceo, compliance, computer, computing, corporate, credentials, cyber, cybersecurity, data, data-breach, deep-fake, defense, encryption, finance, government, group, identity, incident response, infrastructure, jobs, law, malicious, mfa, monitoring, network, nist, openai, passkey, password, phishing, privacy, regulation, risk, service, skills, strategy, technology, theft, threat, tool, vulnerabilityBig tech platforms have strong verification that prevents impersonation: Some of the largest tech platforms like to talk about their strong identity checks as a way to stop impersonation. But looking good on paper is one thing, and holding up to the promise in the real world is another.”The truth is that even advanced verification…
-
CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed
Future-proof attack scenarios: As for the central problem of not knowing what kind of attacks to plan for, Avakian suggests using internal teams or partners to roleplay the most likely attack vectors. To save money, he encourages enterprises to partner with universities for imaginative threat planning and to work with vertical-specific ISACs. Ivan Shefrin, executive director…
-
CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed
Future-proof attack scenarios: As for the central problem of not knowing what kind of attacks to plan for, Avakian suggests using internal teams or partners to roleplay the most likely attack vectors. To save money, he encourages enterprises to partner with universities for imaginative threat planning and to work with vertical-specific ISACs. Ivan Shefrin, executive director…

