Burned out by bots: The rise of prompt fatigue in the workplace
Generative artificial intelligence (genAI) tools have quickly become commonplace in the workplace. In the rush to boost productivity, many organizations have adopted them without fully considering how best to integrate them into daily workflows. Some employees are now complaining of “prompt fatigue” — a kind of cognitive drain similar to the “Zoom fatigue” of the […] more…AI backlash forces a reality check: humans are as important as ever
AI is like electricity when it was first introduced more than a century ago: People understood its promise, but didn’t know what to do with it. That’s where enterprises are with AI technology today: IT leaders know it will transform businesses, but are not yet sure how to implement it safely and securely — or […] more…Buyer’s guide: How to choose the right business laptops
With hundreds of business-oriented laptops to choose from, picking the right ones to outfit your company’s workforce can be daunting. We’re here to help with a buyer’s guide that breaks the options into categories and provides details, price estimates, and pros and cons of each. Ranging from $200 for the cheapest budget models to nearly […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…How to Prepare for Your Child’s First Smartphone
If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels and riding out into the neighborhood for the first time, a smartphone opens an entirely new world for children. There are apps, social media, group chats with friends, TikTok stars, and the joy of simply being “in” with their classmates and […] more…KBOT: sometimes they come back
Although by force of habit many still refer to any malware as a virus, this once extremely common class of threats is gradually becoming a thing of the past. However, there are some interesting exceptions to this trend: we recently discovered malware that spread through injecting malicious code into Windows executable files; in other words, […] more…The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer electronics industry to show off the latest and greatest cutting-edge innovations in technology. From bendable tablets to 8k TVs and futuristic cars inspired by the movie “Avatar,” CES 2020 did not disappoint. Here are a […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…New Magecart Attack Delivered Through Compromised Advertising Supply Chain
by Chaoying Liu and Joseph C. Chen On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time, we found their malicious skimming code (detected by Trend Micro as JS_OBFUS.C.) loaded on 277 e-commerce websites providing ticketing, touring, and flight booking services as […] more…The New Intern-Net
By Cristina Barrera, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to get top grades, volunteer, participate in sports, play an instrument, and find a cure for a rare disease in my spare time just to get a job interview. And now, on top of this, […] more…Latest phishing tactics: infected PDFs, bogus friend requests, fake HR emails
The bad guys have always got new tricks up their sleeves: here are some tips to help you steer clear of them more…Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
Possibly to maximize the earning potential of Cerber’s developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files. These repositories of organized data enable businesses to store, retrieve, sort, analyze, and manage pertinent information. When utilized effectively they help maintain the organization’s efficiency, so holding these mission-critical files […] more…ATMZombie: banking trojan in Israeli waters
On November 2015, Kaspersky Lab researchers identified ATMZombie, a banking Trojan that is considered to be the first malware to ever steal money from Israeli banks. It uses insidious injection and other sophisticated and stealthy methods. The first method, dubbed “proxy-changing”, is commonly used for HTTP packets inspections. It involves modifying browser proxy configurations and […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…More information
- Managed security service providers face $40M liability exposures
- Facebook Offers Rewards for Access Token Exposure Flaws
- Facebook rolls out React 15 upgrade to JavaScript library
- Security researcher is paid $12,500 by Facebook, after discovering major security flaw
- British Hackers Target Falklands Computer Game
- How banks and businesses can prep for the FedNow instant-payment system
- Russia-linked Hackers Exploit Lojack Recovery Tool in Attacks
- Solving the Right to be Forgotten Problem
- iPad Air and iPad mini 2019 review: Apple’s tablets strike an ideal balance
- U.S. Authorities Reach Settlement With Adobe Over 2013 Breach