AI Skills Shortage Reported by Over One-Third of Tech Professionals

AI Skills Shortage Reported by Over One-Third of Tech Professionals

Recent findings from O’Reilly show a gap between the growing threat landscape and the readiness of security teams to address these threats. One key discovery is the shortage of AI security skills. About 33.9% of tech professionals believe there is a lack of AI-related security skills, specifically concerning prompt injection vulnerabilities. Additionally, a concern was […]

Phishing attacks detected in 62% of finance domains examined

Recent research conducted by BforeAI highlights emerging trends in phishing and spoofing within the financial industry. From January to June 2024, a total of 62,074 registered domains containing financial keywords were identified. Of these domains, 38,737 (62%) were linked to phishing attacks aimed at authentic institutions through spoofed websites. The study suggests that the surge […]

14 new vulnerabilities found in DrayTek by researchers

A recent report by Forescout Technologies has uncovered 14 additional vulnerabilities in DrayTek routers. These vulnerabilities, if left unaddressed, could potentially allow attackers to take full control of the devices, leaving them vulnerable to ransomware, denial of service attacks, and other malicious activities. This highlights the urgent need for immediate action such as patching and […]

Cybersecurity experts debate the implications of the American Water cyberattack

American Water Works Company, Inc., experienced a cyberattack and was forced to pause customer billing. The organization provides services for more than 14 million individuals across 14 states, including 1,700 communities. While finer details of the attack are not currently available, American Water released a statement that unauthorized activity was discovered on its systems, prompting […]

Security experts examine the latest vulnerability included in CISA’s catalog

The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning about a known and exploited vulnerability. This vulnerability is related to Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability (CVE-2024-29824) and has been included in CISA’s Known Exploited Vulnerabilities Catalog. Security leaders share their views Eric Schwake, Director of Cybersecurity Strategy at Salt Security: “The […]

Generative AI training is lacking for 81% of U.S. workers

A recent report by Ivanti analyzed unsafe security practices. According to the report, one in two office workers admit to using personal devices to log into work networks, with 32% of them revealing their employers are unaware of this practice. However, only 13% of security professionals prioritize user experience (UX) for end users when implementing […]

Government agencies use platforms that have vulnerabilities

A security researcher has uncovered vulnerabilities in commercial platforms utilized by United States government agencies and courts. These vulnerabilities were discovered in 19 commercial platforms and could potentially grant malicious individuals access to government and legal systems, compromising confidential data, personal information, and document integrity. The research indicates that these vulnerabilities could be exploited to […]

Brute force cyberattack techniques saw a 12% surge in 2024

Recent analysis in a report by Elastic examined global threats. The report delved into security tools, malware attacks, and cloud environment security. The report highlights the success of adversaries utilizing offensive security tools (OSTs) — tools designed to find security vulnerabilities proactively — in addition to misconfigured cloud environments and a growing focus on credential […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.