All Sectors Are Now Prey as Cyber Threats Expand Targeting

source: | Image:


Aamir Lakhani, security researcher at Fortinet, says no sector is off limits these days: It’s time for everyone to strengthen the kill chain.

Ransomware doesn’t discriminate – today, every sector faces risks.

But we are seeing changes in which sectors are being targeted the most. For instance, while healthcare and education have long been considered the most heavily attacked, that’s shifting. In the latest FortiGuard Labs Global Threat Report, researchers found that the prevalence of ransomware in those two sectors was lower than managed security service providers, the automotive and manufacturing sectors, telecommunications, and government.

The common denominator is that the more an industry becomes digitized, the more opportunity there is for cybercriminals. Let’s look at some of the rising threats in these industries, what that means and what needs to happen next.

Bad Actors Shift to Industrialized Sectors

As we saw with the attacks on Colonial Pipeline and JBS Foods, industrialized sectors aren’t immune to cyberattacks. In fact, they’re becoming increasingly popular with bad actors. For example, manufacturing became a bigger target in the first half of 2021, with FortiGuard Labs researchers finding that ransomware was detected in 32.5 percent of these companies. That’s compared with just 12.1 percent in the first half of 2020 (PDF).

Continue reading “All Sectors Are Now Prey as Cyber Threats Expand Targeting”

Scottish Cybersecurity Startup Unveils Versatile AI-Based Deception


source:  |  Images:

Glasgow, Scotland-based start-up Lupovis – a spin-out from the University of Strathclyde – has announced pre-seed funding of over £615,000 (just under $850,000). This is almost twice the average amount for pre-seed funding. The funds will be used to further develop a new AI-based deception technology.

Deception is a fail-safe technology. It does nothing to prevent a breach, but instead concentrates on neutralizing any malicious effect from an incursion. It does this by quietly shepherding the attacker away from the company’s genuine assets and into harmless decoy areas. ‘Lupovis’ comes from the Latin for wolf and sheep – it is a wolf in sheep’s clothing engaged in silently hunting the attacker.

Lupovis is unique in its application of deception. It gathers attackers’ TTPs into a database and then uses AI to determine the level of sophistication of the attacker. It can then dynamically change the level of deception to match the skills of the aggressor. The effect keeps the attacker safely occupied on the network while the defender learns more about the aggressor.

Continue reading “Scottish Cybersecurity Startup Unveils Versatile AI-Based Deception”

The complete A-to-Z guide to how Amazon is taking over everything



It doesn’t matter that Jeff Bezos has stepped down. No industry is safe from the company’s relentless ambition.

Pick an industry, any industry, and chances are, Amazon is having an impact on it right now. Retail —well, that’s been obvious for a long time. Other sectors might surprise you, though, such as medical care, ocean freight shipping, gaming, and…hair salons. When you consider Amazon’s collective influence across business and society, through subsidiaries such as Ring, Twitch, Whole Foods, MGM, Zappos, Zoox, and more, the result is staggering. And under new CEO Andy Jassy—who grew AWS into the revenue engine that powers the entire operation—it looks like it might only get bigger.

To understand Amazon’s reach, and the forces that could bring it down (or break it up), Fast Company’s editors and writers created an encyclopedic guide to Amazon’s colossal and ever-mutating domain, most of which you can’t even see.

Welcome to Amazon, unpacked.


Note:  as you may imagine, this is a huge article.  So as not to inundate your computer screen, we think it best that you simply go to the link below and see this fascinating article in its entirety:


Israeli researchers bypass facial recognition using AI-generated makeup patterns


source: | Images:


Israeli researchers have found an apparently straightforward method to fool facial recognition software — by applying conventional makeup to specific areas of the face according to a pattern determined by an artificial intelligence program.

The study, conducted at Beersheba’s Ben-Gurion University, found that when applying the computer-generated makeup pattern to test subjects, the systems were bypassed at a near 100% success rate.

Twenty volunteers (10 men and 10 women) either had makeup applied to the most identifiable areas of the face according to the heatmap generated by the software, or random makeup applied, and finally no makeup at all.

Continue reading “Israeli researchers bypass facial recognition using AI-generated makeup patterns”

Implementing AI security solutions: A crawl-before-you-run strategy


source: | image:


In navigating the shift from burglar alarms to digital security systems, many organizations are adopting artificial intelligence (AI) to bolster their security postures. In fact, a large majority of security operation centers (SOCs) employ AI and machine learning tools to detect advanced threats. However, not all AI is created equal and reaching too high too quickly with technological solutions can leave security teams with unclear or inefficient workflows. To get the most out of new technologies, security practitioners should focus on starting small with foundational AI technologies in order to lay the groundwork for a more reliable and mature security system.

It’s important to keep in mind that AI technology is still maturing every day. New AI tools for security, often related to computer vision and surveillance camera analytics, are continually surfacing on the market. Often many organizations feel pressured to try the “latest and greatest” and end up testing expensive solutions that don’t deliver what they promise, which turns them off to using AI entirely.

In some cases, too-advanced systems can provide a lower ROI 

In most fields these promises are easy to see through and organizations quickly become savvy to vendors that overpromise and underdeliver. For example, there is no AI that comes close to being able to flag “suspicious people,” and this also opens the doors for privacy and ethical issues.

Continue reading “Implementing AI security solutions: A crawl-before-you-run strategy”

China has won AI battle with U.S., Pentagon’s ex-software chief says

source: | image:


LONDON, Oct 11 (Reuters) – China has won the artificial intelligence battle with the United States and is heading towards global dominance because of its technological advances, the Pentagon’s former software chief told the Financial Times.

China, the world’s second largest economy, is likely to dominate many of the key emerging technologies, particularly artificial intelligence, synthetic biology and genetics within a decade or so, according to Western intelligence assessments.


















What Is Artificial Intelligence?

source: | image:

Artificial intelligence (AI) has become a red-hot topic, with record levels of investment in “AI” companies and promises of capabilities that will revolutionize our lives. Many are puzzling through how AI can add value, and a growing number of vendors claim to be “AI-powered.” Given the buzz and rush to wrap the mantle of AI around any new technology, it makes sense to ask the basic question, “What exactly is AI?”

Start with the practical definition that artificial intelligence is any technology that tries to replicate some broader aspect of human intelligence. I emphasize “broader,” as that’s where a fair amount of confusion emerges. Think, for example, of the ability to perform arithmetic. Most people would agree that this capability is uniquely human. But I doubt anyone would conclude that a calculator is built on artificial intelligence.

Continue reading “What Is Artificial Intelligence?”

How to Permanently Delete Your Facebook Account


If you’ve finally hit your breaking point, here’s how to say goodbye to Mark Zuckerberg’s empire.


THERE’S NEVER A bad time to delete your Facebook account: Chances are good you use it less than ever, and every time you do log on you’re greeted by a slurry of reheated viral news and life updates from two or three distant acquaintances. Now, though, feels like an especially good time to pull the plug.

There’s the ongoing series of Wall Street Journal stories that claim the company repeatedly ignored internal research about the various harms its products cause. There’s the prolonged outage that made you think maybe so much of the world’s internet activity shouldn’t run through a single company. And there’s the general sense that Facebook is probably, on the whole, not so great for society. At a certain point it’s too much, you know? If you’ve reached that point, here’s how to quit Facebook for good, along with how to limit how much it can track you after you’re gone.

The CIA’s Least Covert Mission


contributed by Artemus FAN, Stephen L. Page

Image by David Mark from Pixabay 



In the bowels of its Langley headquarters, a fluorescent-lit, mundane office space houses a team of about a dozen people engaged in what is perhaps the Central Intelligence Agency’s least covert mission: to make American citizens “like” the agency on social media.

An edict is posted to the wall: “Every time you make a typo….the errorists win.”

The United State’s premier intelligence agency has slowly ramped up its social media presence since joining Facebook and Twitter in 2014, creating one of the federal government’s quirkiest, creative, and controversial PR campaigns.

Continue reading “The CIA’s Least Covert Mission”


The Argument for a National US Data Privacy Framework


Photo by ThisIsEngineering from Pexels


Against the backdrop of escalating cybercrime and data breaches throughout 2020 and 2021, state legislators in over 29 US states have thrown the spotlight on data privacy this year, putting it high on the agenda in legislative sessions.

Among other things, the rights of consumers to opt out of data collection on websites, providing watertight protection and privacy for children online, and the monitoring of employee emails have all been closely scrutinized.

Perhaps most crucially, legislators have taken a closer look at the role and responsibility of commercial and governmental entities in ensuring data protection, as well as the need for companies to make clear what data is collected, what will be done with it, and for how long it will be kept.

Continue reading “The Argument for a National US Data Privacy Framework”