News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Audio deepfakes with generative AI
B2B Cyber ​​Security ShortNews

Audio deepfakes, i.e. voices imitated with computer systems, are constantly evolving. This results in an increase in AI-supported fraud attempts. The so-called "grandchild trick", in which the perpetrator usually pretends to be the victim's child or grandchild and pretends a crisis situation in order to obtain financial support, is already well known. Now, however, artificial intelligence is used that specializes in imitating voices. These AIs sometimes only need 30 minutes of audio material and can use it to create a complete voice profile with which this person can be impersonated. With the use of generative AI, it is possible to...

Read more

ChatGPT and the violated data protection
B2B Cyber ​​Security ShortNews

Generative AI systems like ChatGPT receive a lot of attention and are fed with data by thousands of users every day in disregard for data protection. More and more companies are using the technologies and using them for a wide variety of projects and processes. The tools are primarily used for gathering information, writing texts and translating. Unfortunately, many users are not very considerate with sensitive company data and let the AI ​​work for them. This procedure can cause serious consequential damage, since this data can be accessed without the control of any other user who only asks the right questions...

Read more

The most dangerous attack method: social engineering
The most dangerous attack method: social engineering

According to Verizon's Data Breach Investigations Report, 74% of security breaches are the result of successful social engineering attacks, bugs, abuse, and other human weaknesses. Also in many companies. A little good news: In the previous year, 82 percent of security breaches were recorded. But 74 percent remain social engineering attacks, according to Verizon's Data Breach Investigations report. The most successful attack method with 50 percent is pretexting, i.e. a social engineering activity with a specific pretext as the trigger. This is a double increase compared to last year. Phishing, phishing, phishing pretexting is...

Read more

QR code phishing security test tool
QR code phishing security test tool

KnowBe4 is now offering a complementary QR code phishing security test tool that identifies users who are victims of QR code phishing attacks. The free tool (QR Code PST) helps businesses identify end-users who are particularly vulnerable to scanning malicious QR codes. Many companies are aware of the typical social engineering techniques used by malicious actors. These include phishing, spear phishing and identity theft to manipulate employees and infiltrate systems. Actors have now recognized the popularity of QR codes and are using them for targeted phishing attacks. Targeted QR code phishing attacks QR code phishing is a social engineering attack that uses a…

Read more

ChatGPT Threat Level
B2B Cyber ​​Security ShortNews

The results of a survey show that, despite the threat situation and their concerns, the majority consider the AI ​​to be of good quality and at least want to use it for personal use. The rapid development of AI can currently be observed with your own eyes. The new GPT-2023 version of OpenAI was only released in March 4, and its opportunities and, above all, its risks are the subject of lively public debate. In a survey conducted by KnowBe4 in March 2023, 270 people were asked about their experiences and assessments of ChatGPT. A very interesting observation...

Read more

Phishing tests: Business-related emails as a threat
Phishing tests: business-related emails as a threat

Results of a major phishing test show a trend towards business-related emails. KnowBe4 releases Q3 2022 Global Phishing Report and finds that more business-related email topics are being used as a phishing strategy. KnowBe4, provider of the world's largest security training and phishing simulation platform, announces the results of its report on the top clicks on phishing emails in Q3 2022. Results include the top email topics clicked in phishing tests. They reflect the shift from personal to business-related email topics, including internal inquiries and updates from HR, IT, and managers. Exchange OP and Defender to…

Read more