Illegal gambling operations depend on trafficked individuals to perform cybercriminal activities. Threat researchers at Infoblox explain how cybercriminals use trafficked people for operations such as pig-butchering scams and leverage European sports sponsorships to boost illegal gambling websites.
Maricopa County CISO Lester Godsey highlights the growing threat of misinformation and its impact on election security. He explains how his team is integrating cybersecurity frameworks to address both digital and physical risks, focusing on disinformation campaigns and election integrity.
RedSense’s Yelisey Bohuslavskiy and Marley Smith believe ransomware is declining but caution that it still poses a significant threat. While attackers recycle old methods, they're taking desperate measures to target vulnerable groups such as cancer centers and to stoke fears in the marketplace.
Accenture Global Cyber Resilience Lead Robert Boyce outlines why organizations must assess the stability of ransomware groups before deciding how to respond to extortion threats. He outlines how trustworthiness of ransomware gangs can affect the likelihood of receiving decryption keys after payment.
Thijs Alkemade, security researcher at Computest Sector 7, discusses significant vulnerabilities in electric vehicle chargers. His findings highlight how attackers can exploit these flaws to remotely execute code, posing severe risks to EV infrastructure.
Shachar Menashe, senior director of security research at JFrog, discusses critical security risks in MLOps platforms - including code execution vulnerabilities in machine learning models - and why organizations must treat ML models as potentially malicious code to mitigate these inherent risks.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
The ability to create real-time deepfakes of trusted figures has transformed the landscape of corporate security threats. Brandon Kovacs, senior red team consultant at Bishop Fox, details how attackers can now clone voices and video in real-time, enabling new forms of social engineering and fraud.
Europe faces unprecedented security challenges as organizations embrace digital change. That's why ENISA is focusing on critical areas to bolster Europe's digital defenses - supporting member states by enhancing their cybersecurity programs through legislation, exercises and comprehensive reports.
The SolarWinds case has redefined cybersecurity disclosure obligations, especially for chief information security officers. The SEC's novel theories in this case have set a precedent for how organizations must present their cybersecurity practices, said Jennifer Lee, partner at Jenner & Block.
Hardware security remains a critical concern for IoT and embedded devices. NCC Group's Alex Plaskett, security researcher, and Robert Herrera, senior security consultant, discuss critical vulnerabilities in Sonos devices and best practices for safeguarding hardware and software.
Brandon Pugh of R Street Institute discusses Congress' struggle to balance AI innovation and regulation, the U.S. approach compared to the EU, and the urgent need for privacy laws to protect AI-driven data. He emphasizes education on AI technologies and the ongoing challenge of defining key terms.
The security of a large enterprise starts at the top, but members of the C-suite often have conflicting priorities and a lack of understanding about the role their part of the organization plays in keeping the business running, said Theresa Lanowitz, chief evangelist at LevelBlue.
Many cybersecurity organizations hope generative artificial intelligence and large language models will help them secure the enterprise and comply with the latest regulations. But to date, commercial LLMs have big problems - hallucinations and a lack of timely data, said NYU professor Brennan Lodge.
John Wrobel, CRO of Menlo Security, highlights how virtual cloud browser technology stops malware, ransomware and credential harvesting. Menlo turns users' existing browsers into secure enterprise browsers, eliminating the need for new software while ensuring protection against web-based threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.