433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams

Security researchers have used the GPT-3 natural language generation model and the ChatGPT chatbot based on it to show how such deep learning models can be used to make social engineering attacks such as phishing or business email compromise scams harder to detect and easier to pull off. The study, by researchers with security firm WithSecure, demonstrates that not only can attackers generate unique variations of the same phishing lure with grammatically correct and human-like written text, but they can build entire email chains to make their emails more convincing and can even generate messages using the writing style of real people based on provided samples of their communications. To read this article in full, please click here
http://news.poseidon-us.com/SgkVhF

Master Class: Bringing Intelligent Communication, Collaboration and Engagement with Microsoft Teams

Today’s new modern workforce requires businesses to provide employees with tools they need to collaborate and work productively to address the universal shift to remote work. Vonage’s integration with Microsoft Teams connects distributed workers through enterprise grade voice, SMS, MMS and AI while leveraging existing Microsoft investments. Learn more!
http://news.poseidon-us.com/SgkQCr

Passive detection of internet-connected systems affected by vulnerabilities from the CISA KEV catalog, (Wed, Jan 11th)

CISA’s Know Exploited Vulnerabilities (KEV) catalog is a wonderful resource for vulnerability and patch management. If you have not come across it yet, it is – as the name suggests – a list of vulnerabilities that are currently known to be actively exploited in the wild, which is published by the US Cybersecurity & Infrastructure Agency (CISA)[1]. It was started back in 2021[2] and currently contains 870 vulnerabilities[3].
http://news.poseidon-us.com/SgjJg9

Ransomware Protection Instant Recovery

Veeam has multiple recovery options which allow you to optimize your recovery processes, and quickly and simultaneously restore multiple machines. Granular options allow the recovery of a single file to applications, entire volumes or servers, reducing the costs of downtime and mitigating the risk associated with a cyber‑attack.
http://news.poseidon-us.com/SggYGQ

Ransomware Protection 3-2-1-1-0 Rule

The 3‑2‑1‑1‑0 Rule is a guiding principle to create air‑gapped, redundant and resilient data security programs that defeat ransomware. Air gaps work by storing data in isolated environments without online access. That way, there is zero possibility of data access or destruction.
http://news.poseidon-us.com/SggXWP

BrandPost: The converging future of XDR and Threat Hunting

The cybersecurity challenge for organizations of all sizes continues to get more difficult. Complex threats and a growing cybersecurity skills gap is making life harder for often overworked IT teams. Without automation, they find it difficult to process and act on a steadily increasing flow of data and security alerts from across the network.  As a result, many organizations are considering extended detection and response (XDR) tools to make better sense of incoming threat information. The market is projected to reach $2.36 billion by 2027, and small to mid-size enterprises are leading the way. To read this article in full, please click here
http://news.poseidon-us.com/SggTLc

You must build a security team. Where do you start?

Security veteran Chris Deibler, the new VP of Security at DataGrail, has been brought in to build the company’s security team to support its growth. A former Director of Security Engineering at Shopify and Director of Security at Twitch, he knows a thing or two (or 52) about successfully instituting a security organization within an enterprise, so we decided to pick his brain on the subject. [The answers have been lightly edited for clarity.] Scaling … More → The post You must build a security team. Where do you start? appeared first on Help Net Security.
http://news.poseidon-us.com/SgfL34

The Forest Service claims progress in the effort to control western wildfires

The Forest Services, part of the Agriculture Department, is in the midst of a 10-year effort to better prevent wildfires, the kinds of seemingly out-of-control blazes that have charred millions of acres out west.
http://news.poseidon-us.com/Sgd8f4

How to control complexity and cost in multicloud environments

As NNSA’s James Wolff notes, agencies now know that complexity is a way of life in the cloud. So how can agencies avoid chaos and spiraling costs? IT leaders from DISA, Energy, GSA, State and VA join Wolff to share their early winning strategies.
http://news.poseidon-us.com/SgcgyD