SlideShare a Scribd company logo
1 of 12
Download to read offline
ISSUE 02 TheCyberExpress
2
Capabilities
Darkweb and Open Internet Monitoring
Attack Surface Detection &
Hunting (DRPS)
Third Party Cyber Scoring
Compromised credentials
Sensitive data leakage
Executive brand protection monitoring
Open-Source Intelligence
Public facing assets
Vulnerable assets
Code Leakage (e.g
GitHub/bitbucket)
Cloud buckets S3, Azure
Malware campaigns
Vendor risk score
Derived from Darkweb, deep web,
attack surface, public breaches,
disclosures, etc
Cybercrime Intelligence
Brand Reputation Monitoring (DRPS)
Threat Intelligence
Advisories on 400+ threat actors and
700+ malware operators
Monitor 80% of Cybercrime markets
Cybercrime conversations/mentions
in forums and markets
Fake/Typo Squatted Domains and
Fake Content
Fake Domains and Fake Content
Fake app detection
Phishing URLs
Take downs
Social media monitoring
IoCs
Security Advisories
Compromised Cards
BINs
ATM PINs
ComprehensiveDigitalRisk
ProtectionwithCybleVision
© 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
ISSUE 02
TheCyberExpress 3
01
02
03
04
Scan QR code and get
External Threat Profile
Report customized for
your organization that
includes:
Knowyour
organization’s
Darkweb
Exposure
Make sure that your business
continuity, compliance and
operational availability is not
at stake
Overview of vulnerabilities in your
digital risk footprint
Risk assessment of your attack
surface and threat landscape
Unique Risk Score as per your
darkweb exposure
Critical information about your
leaked data and security posture
Secure your business
using Cyble’s unified
threat intelligence
platform that offers
6 unique capabilities and
32 research parameters
to deliver 360-degree
intelligence
TO GET THE REPORT!
© 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
ISSUE 02 TheCyberExpress
4
Contents
34
Artificial Intelligence and
The Top 6 Business Risks
CYBERVILLE
20
Biometric security
will be vital in a
postquantum future
FORESIGHT
10
Voice Networks are Under
Attack – is Anybody
Listening?
DIGEST
14
Behavioral Psychology,
A Boon For Insider Risk
Mitigation
INSIDER
7
FROM THE EDITOR
Past and Future in the
same frame
ISSUE 02
TheCyberExpress 5
46
56
74
80
Using AI to Fight Human
Trafficking and Modern
Slavery… Can We Win?
Artificial Intelligence, Genuine
Training: Can Ai Help In
Learning Cybersecurity?
AI Arms Race: Hackers vs
Cybersecurity Professional, a
Battle for Digital Dominance
The Monthly Round-Up
THE COVER
ACADEMIA
BOTTOM LINE
NUGGETS
24
REGISTER
Risk Management Is
Nothing But Decision
Management
62 68
HOT SEAT SCOOP
How Secure Is Your
Connected Vehicle?
Quantum Cybersecurity
will Revolutionize the
Industry
ISSUE 02 TheCyberExpress
6
Augustin Kurian
Editor-in-Chief
editor@thecyberexpress.com
Chandu Gopalakrishnan
Executive Editor
chandu@thecyberexpress.com
Avantika Chopra
Senior Sub-Editor
avantika@thecyberexpress.com
Vishwa Pandagle
Journalist
vishwa@thecyberexpress.com
Ashish Khaitan
Journalist
ashish@thecyberexpress.com
Vittal Chowdry
Senior Graphic Designer
vittal@thecyberexpress.com
Rajashakher Intha
Head - Marketing & Sales
raj@thecyberexpress.com
Mir Ali
Head - Partnerships
mir@thecyberexpress.com
Taruna Bose
Head - Digital Sales
taruna@thecyberexpress.com
Ashish Jaiswal
Conference Manager
ashish.j@thecyberexpress.com
Priti Chaubey
Content Strategist
priti.c@thecyberexpress.com
Ravi Gupta
SEO Analyst
ravi@thecyberexpress.com
Editorial Management
STAFF
*Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC.,
The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher.
Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The
ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers
in writing.
Image credits: Shutterstock & Freepik
ISSUE 02
TheCyberExpress 7
From The
Editor’s DESK
Artificial Intelligence: The
Bridge Between Utopia and
Dystopia
Myths, stories, and Greek
antiquities.
It was believed that
Hephaestus, the Greek god
of metallurgy, created and
programmed a giant bronze
warrior named Talos to protect
Crete. Talos is said to be a
futuristic cybernetic creature
that can think and feel.
It was believed that
Hephaestus created the
creature as part of his project,
which involved combining
neurological-computer
interfaces and living and non-
living components into one
massive being. The mythology
surrounding the creation of
the warrior is also said to be
the first example of people
thinking about the potential of
AI and intelligent robots.
Cut to the present, AI is all
around us, and data and
algorithms have become more
important to our lives than we
can fathom. And this is just the
beginning.
AI has the potential to
transform the way we interact
with the world around us. It
can assist us in performing
specific tasks based on its
capabilities and improve our
lives in several ways. But that’s
not all. The benefits of using
AI in the field of cybersecurity
are numerous. It can help
prevent and detect threats
before they occur, improving
the organisation’s efficiency.
However, the increasing use
of AI in the cybersecurity
industry has raised concerns
about the potential impact on
several vectors. In this edition,
we discuss AI and The Top 6
Business Risks in detail.
The Cover of the magazine
talks about something even
more grave and how AI can
become a tool for fixing a dire
problem. We highlight ways
of integrating data fusion and
AI tools, which can, in turn,
play a key role in fighting
and drastically reducing the
exponentially high number of
people forced into modern
slavery.
On the better side, we
talk about leveraging AI in
cybersecurity education. We
believe artificial Intelligence
can make complex terms and
topics relatively simpler, but
there is still a long way to go.
In our interviews, we have
Chuck Brooks, President
of Brooks Consulting
International, discussing how
AI and ML are disrupting
the cybersecurity space. We
also have Ash Hunt, Global
Chief Information Security
Officer (CISO) at the Apex
Group, discussing the risk
quantification, metrics, and
testing risk scenarios for
staying better prepared in
cyber risk management.
Connected devices come
with much data, and the vast
collection of highly sensitive
data in connected vehicles
necessitates an entirely new
level of security – especially
against ransomware, cyber
war, and other cyberattacks
that exploit software and
hardware flaws. The issue also
talks about the security of
connected vehicles.
Let us know what you liked
the best in this issue. Reach
out to us with your valuable
feedback at editorial@
thecyberexpress.com.
Editor-in-Chief
Augustin Kurian
ISSUE 02 TheCyberExpress
8
ISSUE 02
TheCyberExpress 9
ISSUE 02 TheCyberExpress
10
Voice Networks
are Under Attack –
is Anybody
Listening?
- By Brian McDonald
Security Officer, Mutare, Inc.
Who would have guessed that, in 2022, the humble phone
would become a favorite weapon for cybercriminals intent
on infiltrating high-profile organizations in order to disrupt
operations, embed ransomware, advance extortion
schemes, and steal customer data?
Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite
the technological sophistication of their own offerings,
all fell victim to damaging data breaches perpetrated by
criminal agents whose point of entry was through a simple
phone call. This emerging threat vector has come to be
known as “voice phishing” or simply, vishing.
Obviously, there is nothing new about scam calls. However,
voice phishing has steadily evolved into a criminal art form.
DIGEST
ISSUE 02
TheCyberExpress 11
ISSUE 02 TheCyberExpress
12
Most commonly, the attack is perpetrated by an
adversary, either working alone or as part of an organized
cybercriminal gang, who first seeks out vulnerable human
targets through data mining and reconnaissance calling.
Once a connection is made, the impostor gains trust
through psychological manipulation (social engineering)
in order to extract protected information or account
login credentials. Sometimes the call comes on the
heels of a related email notification or text message.
Other times an email or text may include a call-back
number that connects the victim to a call center manned
by co-conspirator agents trained in social engineering
techniques. In all cases, the goal is the same: to lower the
resistance of the victim through the power of the human
voice connection.
Employees, unlike consumers, cannot simply ignore calls
from unknown sources, which makes them particularly
vulnerable to socially engineered manipulation. In fact,
a recent study showed that more than 37% of vishing
attempts actually would succeed at extracting the
desired action from unsuspecting human targets. When
combined with a phishing email (hybrid phishing/vishing),
the success rate rose to 75%.
2022 saw a startling 550% rise in reported enterprise
vishing attacks that affected a reported 70% of all
organizations, with several factors fueling this sharp
acceleration.
First, impostors have broadened their access to the
tools of deception thanks to digitalized public sources,
unprotected social media accounts, and the vast
repository of stolen information found on the Dark Web.
Some may add deep fake voice manipulation technology
to further their deceit. And, while the transition from
analog calling to Voice over Internet Protocol (VoIP)
over the past decade has enabled high quality, low
cost, global voice communications and collaboration, it
has also super-charged the ability of nefarious criminal
agents, using auto-dialers, pre-recorded messages,
caller ID spoofing, generous VoIP bandwidth and cheap,
untraceable overseas call centers, to reach thousands of
intended victims with little effort, expenditure, or risk.
DIGEST
TO READ THE FULL ISSUE

More Related Content

Similar to Magazine Febuary-2023-Preview.pdf

The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfCiente
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdfinsightssuccess2
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces Edology
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 

Similar to Magazine Febuary-2023-Preview.pdf (20)

The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Cyber security
Cyber securityCyber security
Cyber security
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 

Recently uploaded

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Magazine Febuary-2023-Preview.pdf

  • 1.
  • 2. ISSUE 02 TheCyberExpress 2 Capabilities Darkweb and Open Internet Monitoring Attack Surface Detection & Hunting (DRPS) Third Party Cyber Scoring Compromised credentials Sensitive data leakage Executive brand protection monitoring Open-Source Intelligence Public facing assets Vulnerable assets Code Leakage (e.g GitHub/bitbucket) Cloud buckets S3, Azure Malware campaigns Vendor risk score Derived from Darkweb, deep web, attack surface, public breaches, disclosures, etc Cybercrime Intelligence Brand Reputation Monitoring (DRPS) Threat Intelligence Advisories on 400+ threat actors and 700+ malware operators Monitor 80% of Cybercrime markets Cybercrime conversations/mentions in forums and markets Fake/Typo Squatted Domains and Fake Content Fake Domains and Fake Content Fake app detection Phishing URLs Take downs Social media monitoring IoCs Security Advisories Compromised Cards BINs ATM PINs ComprehensiveDigitalRisk ProtectionwithCybleVision © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  • 3. ISSUE 02 TheCyberExpress 3 01 02 03 04 Scan QR code and get External Threat Profile Report customized for your organization that includes: Knowyour organization’s Darkweb Exposure Make sure that your business continuity, compliance and operational availability is not at stake Overview of vulnerabilities in your digital risk footprint Risk assessment of your attack surface and threat landscape Unique Risk Score as per your darkweb exposure Critical information about your leaked data and security posture Secure your business using Cyble’s unified threat intelligence platform that offers 6 unique capabilities and 32 research parameters to deliver 360-degree intelligence TO GET THE REPORT! © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  • 4. ISSUE 02 TheCyberExpress 4 Contents 34 Artificial Intelligence and The Top 6 Business Risks CYBERVILLE 20 Biometric security will be vital in a postquantum future FORESIGHT 10 Voice Networks are Under Attack – is Anybody Listening? DIGEST 14 Behavioral Psychology, A Boon For Insider Risk Mitigation INSIDER 7 FROM THE EDITOR Past and Future in the same frame
  • 5. ISSUE 02 TheCyberExpress 5 46 56 74 80 Using AI to Fight Human Trafficking and Modern Slavery… Can We Win? Artificial Intelligence, Genuine Training: Can Ai Help In Learning Cybersecurity? AI Arms Race: Hackers vs Cybersecurity Professional, a Battle for Digital Dominance The Monthly Round-Up THE COVER ACADEMIA BOTTOM LINE NUGGETS 24 REGISTER Risk Management Is Nothing But Decision Management 62 68 HOT SEAT SCOOP How Secure Is Your Connected Vehicle? Quantum Cybersecurity will Revolutionize the Industry
  • 6. ISSUE 02 TheCyberExpress 6 Augustin Kurian Editor-in-Chief editor@thecyberexpress.com Chandu Gopalakrishnan Executive Editor chandu@thecyberexpress.com Avantika Chopra Senior Sub-Editor avantika@thecyberexpress.com Vishwa Pandagle Journalist vishwa@thecyberexpress.com Ashish Khaitan Journalist ashish@thecyberexpress.com Vittal Chowdry Senior Graphic Designer vittal@thecyberexpress.com Rajashakher Intha Head - Marketing & Sales raj@thecyberexpress.com Mir Ali Head - Partnerships mir@thecyberexpress.com Taruna Bose Head - Digital Sales taruna@thecyberexpress.com Ashish Jaiswal Conference Manager ashish.j@thecyberexpress.com Priti Chaubey Content Strategist priti.c@thecyberexpress.com Ravi Gupta SEO Analyst ravi@thecyberexpress.com Editorial Management STAFF *Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC., The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing. Image credits: Shutterstock & Freepik
  • 7. ISSUE 02 TheCyberExpress 7 From The Editor’s DESK Artificial Intelligence: The Bridge Between Utopia and Dystopia Myths, stories, and Greek antiquities. It was believed that Hephaestus, the Greek god of metallurgy, created and programmed a giant bronze warrior named Talos to protect Crete. Talos is said to be a futuristic cybernetic creature that can think and feel. It was believed that Hephaestus created the creature as part of his project, which involved combining neurological-computer interfaces and living and non- living components into one massive being. The mythology surrounding the creation of the warrior is also said to be the first example of people thinking about the potential of AI and intelligent robots. Cut to the present, AI is all around us, and data and algorithms have become more important to our lives than we can fathom. And this is just the beginning. AI has the potential to transform the way we interact with the world around us. It can assist us in performing specific tasks based on its capabilities and improve our lives in several ways. But that’s not all. The benefits of using AI in the field of cybersecurity are numerous. It can help prevent and detect threats before they occur, improving the organisation’s efficiency. However, the increasing use of AI in the cybersecurity industry has raised concerns about the potential impact on several vectors. In this edition, we discuss AI and The Top 6 Business Risks in detail. The Cover of the magazine talks about something even more grave and how AI can become a tool for fixing a dire problem. We highlight ways of integrating data fusion and AI tools, which can, in turn, play a key role in fighting and drastically reducing the exponentially high number of people forced into modern slavery. On the better side, we talk about leveraging AI in cybersecurity education. We believe artificial Intelligence can make complex terms and topics relatively simpler, but there is still a long way to go. In our interviews, we have Chuck Brooks, President of Brooks Consulting International, discussing how AI and ML are disrupting the cybersecurity space. We also have Ash Hunt, Global Chief Information Security Officer (CISO) at the Apex Group, discussing the risk quantification, metrics, and testing risk scenarios for staying better prepared in cyber risk management. Connected devices come with much data, and the vast collection of highly sensitive data in connected vehicles necessitates an entirely new level of security – especially against ransomware, cyber war, and other cyberattacks that exploit software and hardware flaws. The issue also talks about the security of connected vehicles. Let us know what you liked the best in this issue. Reach out to us with your valuable feedback at editorial@ thecyberexpress.com. Editor-in-Chief Augustin Kurian
  • 10. ISSUE 02 TheCyberExpress 10 Voice Networks are Under Attack – is Anybody Listening? - By Brian McDonald Security Officer, Mutare, Inc. Who would have guessed that, in 2022, the humble phone would become a favorite weapon for cybercriminals intent on infiltrating high-profile organizations in order to disrupt operations, embed ransomware, advance extortion schemes, and steal customer data? Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite the technological sophistication of their own offerings, all fell victim to damaging data breaches perpetrated by criminal agents whose point of entry was through a simple phone call. This emerging threat vector has come to be known as “voice phishing” or simply, vishing. Obviously, there is nothing new about scam calls. However, voice phishing has steadily evolved into a criminal art form. DIGEST
  • 12. ISSUE 02 TheCyberExpress 12 Most commonly, the attack is perpetrated by an adversary, either working alone or as part of an organized cybercriminal gang, who first seeks out vulnerable human targets through data mining and reconnaissance calling. Once a connection is made, the impostor gains trust through psychological manipulation (social engineering) in order to extract protected information or account login credentials. Sometimes the call comes on the heels of a related email notification or text message. Other times an email or text may include a call-back number that connects the victim to a call center manned by co-conspirator agents trained in social engineering techniques. In all cases, the goal is the same: to lower the resistance of the victim through the power of the human voice connection. Employees, unlike consumers, cannot simply ignore calls from unknown sources, which makes them particularly vulnerable to socially engineered manipulation. In fact, a recent study showed that more than 37% of vishing attempts actually would succeed at extracting the desired action from unsuspecting human targets. When combined with a phishing email (hybrid phishing/vishing), the success rate rose to 75%. 2022 saw a startling 550% rise in reported enterprise vishing attacks that affected a reported 70% of all organizations, with several factors fueling this sharp acceleration. First, impostors have broadened their access to the tools of deception thanks to digitalized public sources, unprotected social media accounts, and the vast repository of stolen information found on the Dark Web. Some may add deep fake voice manipulation technology to further their deceit. And, while the transition from analog calling to Voice over Internet Protocol (VoIP) over the past decade has enabled high quality, low cost, global voice communications and collaboration, it has also super-charged the ability of nefarious criminal agents, using auto-dialers, pre-recorded messages, caller ID spoofing, generous VoIP bandwidth and cheap, untraceable overseas call centers, to reach thousands of intended victims with little effort, expenditure, or risk. DIGEST TO READ THE FULL ISSUE