Report: Majority of water systems fail to meet EPA compliance standards

Report: Majority of water systems fail to meet EPA compliance standards

The Environmental Protection Agency (EPA) has released an enforcement alert, outlining the steps that vulnerable community drinking water systems must take in order to comply with cybersecurity standards set forth by the Safe Drinking Water Act. This alert is part of an ongoing effort to secure the United States’ critical infrastructure. Notably, an investigation by […]

Malicious Emails Increase by 341% Over Last Six Months

A recent report from SlashNext  shows a significant 341% increase in malicious emails over the past six months. This surge includes a rise in BEC, phishing, and other message-based attacks facilitated by generative AI. Key findings from the report are: Since November 2022, malicious emails have spiked by 4,151% due to the introduction of ChatGPT. […]

BEC attacks targeted 70% of organizations in the past year

An analysis by Arctic Wolf indicates that business email compromise (BEC) incidents are widespread, with 70% of organizations facing attempted attacks in the past year. Of these, 29% fell prey to one or more successful BEC attacks. The assessment also delves into ransomware. It states that 45% of the respondents faced a ransomware occurrence in […]

Top motivator for cloud-based backup is data protection

Cloud adoption and security were examined in a recent report from Veeam Software. According to the report, organizations are increasingly considering cloud-based backup due to the desire to merge cyber technologies with data protection and backup, as well as the enhanced and consistent protection of cloud-hosted workloads. Many organizations start by integrating cloud storage into […]

Report: Generative AI bots can be easily influenced by users

A new report by Immersive Labs has found that generative AI bots are vulnerable to manipulation by users of all skill levels, not just cyber experts. The report highlights the main security concern of generative AI’s susceptibility to prompt injection attacks, where users input specific commands to trick chatbots into revealing sensitive information, potentially leading […]

Leading tech providers commit to secure by design pledges, says CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has announced that 68 top software manufacturers have voluntarily committed to CISA’s Secure by Design pledge. These software manufacturers have pledged to make measurable progress towards seven specific goals to enhance the security of critical infrastructure. The seven goals outlined in this commitment, to be achieved within a […]

A software supply chain attack affected 59% of organizations

A report by the Ponemon Institute found that 59% of organizations experienced a software supply chain attack, with 54% of these respondents having experienced one in the past year. This survey was conducted among 1,278 IT and IT security practitioners, with managers, directors and senior executives making up nearly half (49%) of the survey demographic. […]

The Benefits of Using Predictive Risk Scoring in Security AI

Invicti recently launched its Predictive Risk Scoring feature, which is a groundbreaking industry first that can generate accurate security risk predictions before vulnerability scanning even begins. To learn more, visit Predictive Risk Scoring for details. This feature utilizes a custom-built machine learning model trained on real-world vulnerability data (excluding customer data) that is operated internally […]

Meta is the second most commonly imitated brand for credential phishing

A recent report by Cofense delves into the intricate details of a sophisticated phishing campaign designed to circumvent multi-factor authentication (MFA) in order to target Meta business accounts. The report uncovers the existence of a cybercrime toolkit that enables malicious actors to craft links, emails, and other deployable tools. This campaign is currently capable of […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.