Publicidad
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Publicidad
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Publicidad
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
Próximo SlideShare
AI in HackingAI in Hacking
Cargando en ... 3
1 de 12
Publicidad

Más contenido relacionado

Publicidad

Magazine Febuary-2023-Preview.pdf

  1. ISSUE 02 TheCyberExpress 2 Capabilities Darkweb and Open Internet Monitoring Attack Surface Detection & Hunting (DRPS) Third Party Cyber Scoring Compromised credentials Sensitive data leakage Executive brand protection monitoring Open-Source Intelligence Public facing assets Vulnerable assets Code Leakage (e.g GitHub/bitbucket) Cloud buckets S3, Azure Malware campaigns Vendor risk score Derived from Darkweb, deep web, attack surface, public breaches, disclosures, etc Cybercrime Intelligence Brand Reputation Monitoring (DRPS) Threat Intelligence Advisories on 400+ threat actors and 700+ malware operators Monitor 80% of Cybercrime markets Cybercrime conversations/mentions in forums and markets Fake/Typo Squatted Domains and Fake Content Fake Domains and Fake Content Fake app detection Phishing URLs Take downs Social media monitoring IoCs Security Advisories Compromised Cards BINs ATM PINs ComprehensiveDigitalRisk ProtectionwithCybleVision © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  2. ISSUE 02 TheCyberExpress 3 01 02 03 04 Scan QR code and get External Threat Profile Report customized for your organization that includes: Knowyour organization’s Darkweb Exposure Make sure that your business continuity, compliance and operational availability is not at stake Overview of vulnerabilities in your digital risk footprint Risk assessment of your attack surface and threat landscape Unique Risk Score as per your darkweb exposure Critical information about your leaked data and security posture Secure your business using Cyble’s unified threat intelligence platform that offers 6 unique capabilities and 32 research parameters to deliver 360-degree intelligence TO GET THE REPORT! © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  3. ISSUE 02 TheCyberExpress 4 Contents 34 Artificial Intelligence and The Top 6 Business Risks CYBERVILLE 20 Biometric security will be vital in a postquantum future FORESIGHT 10 Voice Networks are Under Attack – is Anybody Listening? DIGEST 14 Behavioral Psychology, A Boon For Insider Risk Mitigation INSIDER 7 FROM THE EDITOR Past and Future in the same frame
  4. ISSUE 02 TheCyberExpress 5 46 56 74 80 Using AI to Fight Human Trafficking and Modern Slavery… Can We Win? Artificial Intelligence, Genuine Training: Can Ai Help In Learning Cybersecurity? AI Arms Race: Hackers vs Cybersecurity Professional, a Battle for Digital Dominance The Monthly Round-Up THE COVER ACADEMIA BOTTOM LINE NUGGETS 24 REGISTER Risk Management Is Nothing But Decision Management 62 68 HOT SEAT SCOOP How Secure Is Your Connected Vehicle? Quantum Cybersecurity will Revolutionize the Industry
  5. ISSUE 02 TheCyberExpress 6 Augustin Kurian Editor-in-Chief editor@thecyberexpress.com Chandu Gopalakrishnan Executive Editor chandu@thecyberexpress.com Avantika Chopra Senior Sub-Editor avantika@thecyberexpress.com Vishwa Pandagle Journalist vishwa@thecyberexpress.com Ashish Khaitan Journalist ashish@thecyberexpress.com Vittal Chowdry Senior Graphic Designer vittal@thecyberexpress.com Rajashakher Intha Head - Marketing & Sales raj@thecyberexpress.com Mir Ali Head - Partnerships mir@thecyberexpress.com Taruna Bose Head - Digital Sales taruna@thecyberexpress.com Ashish Jaiswal Conference Manager ashish.j@thecyberexpress.com Priti Chaubey Content Strategist priti.c@thecyberexpress.com Ravi Gupta SEO Analyst ravi@thecyberexpress.com Editorial Management STAFF *Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC., The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing. Image credits: Shutterstock & Freepik
  6. ISSUE 02 TheCyberExpress 7 From The Editor’s DESK Artificial Intelligence: The Bridge Between Utopia and Dystopia Myths, stories, and Greek antiquities. It was believed that Hephaestus, the Greek god of metallurgy, created and programmed a giant bronze warrior named Talos to protect Crete. Talos is said to be a futuristic cybernetic creature that can think and feel. It was believed that Hephaestus created the creature as part of his project, which involved combining neurological-computer interfaces and living and non- living components into one massive being. The mythology surrounding the creation of the warrior is also said to be the first example of people thinking about the potential of AI and intelligent robots. Cut to the present, AI is all around us, and data and algorithms have become more important to our lives than we can fathom. And this is just the beginning. AI has the potential to transform the way we interact with the world around us. It can assist us in performing specific tasks based on its capabilities and improve our lives in several ways. But that’s not all. The benefits of using AI in the field of cybersecurity are numerous. It can help prevent and detect threats before they occur, improving the organisation’s efficiency. However, the increasing use of AI in the cybersecurity industry has raised concerns about the potential impact on several vectors. In this edition, we discuss AI and The Top 6 Business Risks in detail. The Cover of the magazine talks about something even more grave and how AI can become a tool for fixing a dire problem. We highlight ways of integrating data fusion and AI tools, which can, in turn, play a key role in fighting and drastically reducing the exponentially high number of people forced into modern slavery. On the better side, we talk about leveraging AI in cybersecurity education. We believe artificial Intelligence can make complex terms and topics relatively simpler, but there is still a long way to go. In our interviews, we have Chuck Brooks, President of Brooks Consulting International, discussing how AI and ML are disrupting the cybersecurity space. We also have Ash Hunt, Global Chief Information Security Officer (CISO) at the Apex Group, discussing the risk quantification, metrics, and testing risk scenarios for staying better prepared in cyber risk management. Connected devices come with much data, and the vast collection of highly sensitive data in connected vehicles necessitates an entirely new level of security – especially against ransomware, cyber war, and other cyberattacks that exploit software and hardware flaws. The issue also talks about the security of connected vehicles. Let us know what you liked the best in this issue. Reach out to us with your valuable feedback at editorial@ thecyberexpress.com. Editor-in-Chief Augustin Kurian
  7. ISSUE 02 TheCyberExpress 8
  8. ISSUE 02 TheCyberExpress 9
  9. ISSUE 02 TheCyberExpress 10 Voice Networks are Under Attack – is Anybody Listening? - By Brian McDonald Security Officer, Mutare, Inc. Who would have guessed that, in 2022, the humble phone would become a favorite weapon for cybercriminals intent on infiltrating high-profile organizations in order to disrupt operations, embed ransomware, advance extortion schemes, and steal customer data? Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite the technological sophistication of their own offerings, all fell victim to damaging data breaches perpetrated by criminal agents whose point of entry was through a simple phone call. This emerging threat vector has come to be known as “voice phishing” or simply, vishing. Obviously, there is nothing new about scam calls. However, voice phishing has steadily evolved into a criminal art form. DIGEST
  10. ISSUE 02 TheCyberExpress 11
  11. ISSUE 02 TheCyberExpress 12 Most commonly, the attack is perpetrated by an adversary, either working alone or as part of an organized cybercriminal gang, who first seeks out vulnerable human targets through data mining and reconnaissance calling. Once a connection is made, the impostor gains trust through psychological manipulation (social engineering) in order to extract protected information or account login credentials. Sometimes the call comes on the heels of a related email notification or text message. Other times an email or text may include a call-back number that connects the victim to a call center manned by co-conspirator agents trained in social engineering techniques. In all cases, the goal is the same: to lower the resistance of the victim through the power of the human voice connection. Employees, unlike consumers, cannot simply ignore calls from unknown sources, which makes them particularly vulnerable to socially engineered manipulation. In fact, a recent study showed that more than 37% of vishing attempts actually would succeed at extracting the desired action from unsuspecting human targets. When combined with a phishing email (hybrid phishing/vishing), the success rate rose to 75%. 2022 saw a startling 550% rise in reported enterprise vishing attacks that affected a reported 70% of all organizations, with several factors fueling this sharp acceleration. First, impostors have broadened their access to the tools of deception thanks to digitalized public sources, unprotected social media accounts, and the vast repository of stolen information found on the Dark Web. Some may add deep fake voice manipulation technology to further their deceit. And, while the transition from analog calling to Voice over Internet Protocol (VoIP) over the past decade has enabled high quality, low cost, global voice communications and collaboration, it has also super-charged the ability of nefarious criminal agents, using auto-dialers, pre-recorded messages, caller ID spoofing, generous VoIP bandwidth and cheap, untraceable overseas call centers, to reach thousands of intended victims with little effort, expenditure, or risk. DIGEST TO READ THE FULL ISSUE
Publicidad