article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.

article thumbnail

Heptio founder leads Stacklok, a new software supply chain startup that just raised $17.5M

GeekWire

(Stacklok Photo) A pair of cloud computing vets are jumping back into entrepreneurship with a new startup that helps enterprises vet software supply chains amid a rise in cyber-breaches stemming from open-source code. Hinds is the project founder of Sigstore, a tool to verify and authenticate software artifacts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

OpenHaystack is a new open-source tool that lets you create DIY AirTags on Apple’s Find My network

The Verge

OpenHaystack is a new open-source tool developed by security researchers at the Secure Mobile Networking Lab , who have essentially reverse-engineered the way Apple devices register themselves to the Find My mesh network. It is, in short, a way to create your own DIY AirTags today.

article thumbnail

Top 5 Security Trends for CIOs

CIO Business Intelligence

Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Most commercial enterprise software products and nearly all open-source ones depend upon numerous software packages and libraries. And how do you tell?

Trends 121
article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

… It’s almost the love child of a search engine, like Google, which you can talk to about anything, with the somewhat limited but very real intelligence of AI systems.” ” The need for strong open-source models: “The consolidation of power in AI is a huge risk. I think we need education.

article thumbnail

Tech leaders discuss generative AI’s impact on enterprise, startups and society

GeekWire

Panelists at Wednesday’s discussion included Datar; F5 Distinguished Engineer Joel Moses ; Amazon Web Services Worldwide Leader in AI/ML Denis Batalov ; and Microsoft Principal Machine Learning Scientist Ameya Bhatawdekar. Moses highlighted prompt engineering , which trains AI models to deliver specific results using natural language.

article thumbnail

How to manage cloud exploitation at the edge

CIO Business Intelligence

This can occur through techniques like phishing, social engineering, or exploiting vulnerabilities in authentication mechanisms. First, adversaries are adept at learning from open-source intelligence to develop new tactics, techniques, and procedures (TTPs) making rapid security response imperative.

Cloud 97