SlideShare a Scribd company logo
ISSUE 02 TheCyberExpress
2
Capabilities
Darkweb and Open Internet Monitoring
Attack Surface Detection &
Hunting (DRPS)
Third Party Cyber Scoring
Compromised credentials
Sensitive data leakage
Executive brand protection monitoring
Open-Source Intelligence
Public facing assets
Vulnerable assets
Code Leakage (e.g
GitHub/bitbucket)
Cloud buckets S3, Azure
Malware campaigns
Vendor risk score
Derived from Darkweb, deep web,
attack surface, public breaches,
disclosures, etc
Cybercrime Intelligence
Brand Reputation Monitoring (DRPS)
Threat Intelligence
Advisories on 400+ threat actors and
700+ malware operators
Monitor 80% of Cybercrime markets
Cybercrime conversations/mentions
in forums and markets
Fake/Typo Squatted Domains and
Fake Content
Fake Domains and Fake Content
Fake app detection
Phishing URLs
Take downs
Social media monitoring
IoCs
Security Advisories
Compromised Cards
BINs
ATM PINs
ComprehensiveDigitalRisk
ProtectionwithCybleVision
© 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
ISSUE 02
TheCyberExpress 3
01
02
03
04
Scan QR code and get
External Threat Profile
Report customized for
your organization that
includes:
Knowyour
organization’s
Darkweb
Exposure
Make sure that your business
continuity, compliance and
operational availability is not
at stake
Overview of vulnerabilities in your
digital risk footprint
Risk assessment of your attack
surface and threat landscape
Unique Risk Score as per your
darkweb exposure
Critical information about your
leaked data and security posture
Secure your business
using Cyble’s unified
threat intelligence
platform that offers
6 unique capabilities and
32 research parameters
to deliver 360-degree
intelligence
TO GET THE REPORT!
© 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
ISSUE 02 TheCyberExpress
4
Contents
34
Artificial Intelligence and
The Top 6 Business Risks
CYBERVILLE
20
Biometric security
will be vital in a
postquantum future
FORESIGHT
10
Voice Networks are Under
Attack – is Anybody
Listening?
DIGEST
14
Behavioral Psychology,
A Boon For Insider Risk
Mitigation
INSIDER
7
FROM THE EDITOR
Past and Future in the
same frame
ISSUE 02
TheCyberExpress 5
46
56
74
80
Using AI to Fight Human
Trafficking and Modern
Slavery… Can We Win?
Artificial Intelligence, Genuine
Training: Can Ai Help In
Learning Cybersecurity?
AI Arms Race: Hackers vs
Cybersecurity Professional, a
Battle for Digital Dominance
The Monthly Round-Up
THE COVER
ACADEMIA
BOTTOM LINE
NUGGETS
24
REGISTER
Risk Management Is
Nothing But Decision
Management
62 68
HOT SEAT SCOOP
How Secure Is Your
Connected Vehicle?
Quantum Cybersecurity
will Revolutionize the
Industry
ISSUE 02 TheCyberExpress
6
Augustin Kurian
Editor-in-Chief
editor@thecyberexpress.com
Chandu Gopalakrishnan
Executive Editor
chandu@thecyberexpress.com
Avantika Chopra
Senior Sub-Editor
avantika@thecyberexpress.com
Vishwa Pandagle
Journalist
vishwa@thecyberexpress.com
Ashish Khaitan
Journalist
ashish@thecyberexpress.com
Vittal Chowdry
Senior Graphic Designer
vittal@thecyberexpress.com
Rajashakher Intha
Head - Marketing & Sales
raj@thecyberexpress.com
Mir Ali
Head - Partnerships
mir@thecyberexpress.com
Taruna Bose
Head - Digital Sales
taruna@thecyberexpress.com
Ashish Jaiswal
Conference Manager
ashish.j@thecyberexpress.com
Priti Chaubey
Content Strategist
priti.c@thecyberexpress.com
Ravi Gupta
SEO Analyst
ravi@thecyberexpress.com
Editorial Management
STAFF
*Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC.,
The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher.
Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The
ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers
in writing.
Image credits: Shutterstock & Freepik
ISSUE 02
TheCyberExpress 7
From The
Editor’s DESK
Artificial Intelligence: The
Bridge Between Utopia and
Dystopia
Myths, stories, and Greek
antiquities.
It was believed that
Hephaestus, the Greek god
of metallurgy, created and
programmed a giant bronze
warrior named Talos to protect
Crete. Talos is said to be a
futuristic cybernetic creature
that can think and feel.
It was believed that
Hephaestus created the
creature as part of his project,
which involved combining
neurological-computer
interfaces and living and non-
living components into one
massive being. The mythology
surrounding the creation of
the warrior is also said to be
the first example of people
thinking about the potential of
AI and intelligent robots.
Cut to the present, AI is all
around us, and data and
algorithms have become more
important to our lives than we
can fathom. And this is just the
beginning.
AI has the potential to
transform the way we interact
with the world around us. It
can assist us in performing
specific tasks based on its
capabilities and improve our
lives in several ways. But that’s
not all. The benefits of using
AI in the field of cybersecurity
are numerous. It can help
prevent and detect threats
before they occur, improving
the organisation’s efficiency.
However, the increasing use
of AI in the cybersecurity
industry has raised concerns
about the potential impact on
several vectors. In this edition,
we discuss AI and The Top 6
Business Risks in detail.
The Cover of the magazine
talks about something even
more grave and how AI can
become a tool for fixing a dire
problem. We highlight ways
of integrating data fusion and
AI tools, which can, in turn,
play a key role in fighting
and drastically reducing the
exponentially high number of
people forced into modern
slavery.
On the better side, we
talk about leveraging AI in
cybersecurity education. We
believe artificial Intelligence
can make complex terms and
topics relatively simpler, but
there is still a long way to go.
In our interviews, we have
Chuck Brooks, President
of Brooks Consulting
International, discussing how
AI and ML are disrupting
the cybersecurity space. We
also have Ash Hunt, Global
Chief Information Security
Officer (CISO) at the Apex
Group, discussing the risk
quantification, metrics, and
testing risk scenarios for
staying better prepared in
cyber risk management.
Connected devices come
with much data, and the vast
collection of highly sensitive
data in connected vehicles
necessitates an entirely new
level of security – especially
against ransomware, cyber
war, and other cyberattacks
that exploit software and
hardware flaws. The issue also
talks about the security of
connected vehicles.
Let us know what you liked
the best in this issue. Reach
out to us with your valuable
feedback at editorial@
thecyberexpress.com.
Editor-in-Chief
Augustin Kurian
ISSUE 02 TheCyberExpress
8
ISSUE 02
TheCyberExpress 9
ISSUE 02 TheCyberExpress
10
Voice Networks
are Under Attack –
is Anybody
Listening?
- By Brian McDonald
Security Officer, Mutare, Inc.
Who would have guessed that, in 2022, the humble phone
would become a favorite weapon for cybercriminals intent
on infiltrating high-profile organizations in order to disrupt
operations, embed ransomware, advance extortion
schemes, and steal customer data?
Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite
the technological sophistication of their own offerings,
all fell victim to damaging data breaches perpetrated by
criminal agents whose point of entry was through a simple
phone call. This emerging threat vector has come to be
known as “voice phishing” or simply, vishing.
Obviously, there is nothing new about scam calls. However,
voice phishing has steadily evolved into a criminal art form.
DIGEST
ISSUE 02
TheCyberExpress 11
ISSUE 02 TheCyberExpress
12
Most commonly, the attack is perpetrated by an
adversary, either working alone or as part of an organized
cybercriminal gang, who first seeks out vulnerable human
targets through data mining and reconnaissance calling.
Once a connection is made, the impostor gains trust
through psychological manipulation (social engineering)
in order to extract protected information or account
login credentials. Sometimes the call comes on the
heels of a related email notification or text message.
Other times an email or text may include a call-back
number that connects the victim to a call center manned
by co-conspirator agents trained in social engineering
techniques. In all cases, the goal is the same: to lower the
resistance of the victim through the power of the human
voice connection.
Employees, unlike consumers, cannot simply ignore calls
from unknown sources, which makes them particularly
vulnerable to socially engineered manipulation. In fact,
a recent study showed that more than 37% of vishing
attempts actually would succeed at extracting the
desired action from unsuspecting human targets. When
combined with a phishing email (hybrid phishing/vishing),
the success rate rose to 75%.
2022 saw a startling 550% rise in reported enterprise
vishing attacks that affected a reported 70% of all
organizations, with several factors fueling this sharp
acceleration.
First, impostors have broadened their access to the
tools of deception thanks to digitalized public sources,
unprotected social media accounts, and the vast
repository of stolen information found on the Dark Web.
Some may add deep fake voice manipulation technology
to further their deceit. And, while the transition from
analog calling to Voice over Internet Protocol (VoIP)
over the past decade has enabled high quality, low
cost, global voice communications and collaboration, it
has also super-charged the ability of nefarious criminal
agents, using auto-dialers, pre-recorded messages,
caller ID spoofing, generous VoIP bandwidth and cheap,
untraceable overseas call centers, to reach thousands of
intended victims with little effort, expenditure, or risk.
DIGEST
TO READ THE FULL ISSUE

More Related Content

Similar to Magazine Febuary-2023-Preview.pdf

The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
Ciente
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
insightssuccess2
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
Matthew Rosenquist
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
Edology
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
at MicroFocus Italy ❖✔
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
Bernard Marr
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
Sarah Jarvis
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
CBIZ, Inc.
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
Julie Bridgen
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
Dharmendra Rama
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
Bernard Marr
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 

Similar to Magazine Febuary-2023-Preview.pdf (20)

The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Cyber security
Cyber securityCyber security
Cyber security
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 

Recently uploaded

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

Magazine Febuary-2023-Preview.pdf

  • 1.
  • 2. ISSUE 02 TheCyberExpress 2 Capabilities Darkweb and Open Internet Monitoring Attack Surface Detection & Hunting (DRPS) Third Party Cyber Scoring Compromised credentials Sensitive data leakage Executive brand protection monitoring Open-Source Intelligence Public facing assets Vulnerable assets Code Leakage (e.g GitHub/bitbucket) Cloud buckets S3, Azure Malware campaigns Vendor risk score Derived from Darkweb, deep web, attack surface, public breaches, disclosures, etc Cybercrime Intelligence Brand Reputation Monitoring (DRPS) Threat Intelligence Advisories on 400+ threat actors and 700+ malware operators Monitor 80% of Cybercrime markets Cybercrime conversations/mentions in forums and markets Fake/Typo Squatted Domains and Fake Content Fake Domains and Fake Content Fake app detection Phishing URLs Take downs Social media monitoring IoCs Security Advisories Compromised Cards BINs ATM PINs ComprehensiveDigitalRisk ProtectionwithCybleVision © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  • 3. ISSUE 02 TheCyberExpress 3 01 02 03 04 Scan QR code and get External Threat Profile Report customized for your organization that includes: Knowyour organization’s Darkweb Exposure Make sure that your business continuity, compliance and operational availability is not at stake Overview of vulnerabilities in your digital risk footprint Risk assessment of your attack surface and threat landscape Unique Risk Score as per your darkweb exposure Critical information about your leaked data and security posture Secure your business using Cyble’s unified threat intelligence platform that offers 6 unique capabilities and 32 research parameters to deliver 360-degree intelligence TO GET THE REPORT! © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  • 4. ISSUE 02 TheCyberExpress 4 Contents 34 Artificial Intelligence and The Top 6 Business Risks CYBERVILLE 20 Biometric security will be vital in a postquantum future FORESIGHT 10 Voice Networks are Under Attack – is Anybody Listening? DIGEST 14 Behavioral Psychology, A Boon For Insider Risk Mitigation INSIDER 7 FROM THE EDITOR Past and Future in the same frame
  • 5. ISSUE 02 TheCyberExpress 5 46 56 74 80 Using AI to Fight Human Trafficking and Modern Slavery… Can We Win? Artificial Intelligence, Genuine Training: Can Ai Help In Learning Cybersecurity? AI Arms Race: Hackers vs Cybersecurity Professional, a Battle for Digital Dominance The Monthly Round-Up THE COVER ACADEMIA BOTTOM LINE NUGGETS 24 REGISTER Risk Management Is Nothing But Decision Management 62 68 HOT SEAT SCOOP How Secure Is Your Connected Vehicle? Quantum Cybersecurity will Revolutionize the Industry
  • 6. ISSUE 02 TheCyberExpress 6 Augustin Kurian Editor-in-Chief editor@thecyberexpress.com Chandu Gopalakrishnan Executive Editor chandu@thecyberexpress.com Avantika Chopra Senior Sub-Editor avantika@thecyberexpress.com Vishwa Pandagle Journalist vishwa@thecyberexpress.com Ashish Khaitan Journalist ashish@thecyberexpress.com Vittal Chowdry Senior Graphic Designer vittal@thecyberexpress.com Rajashakher Intha Head - Marketing & Sales raj@thecyberexpress.com Mir Ali Head - Partnerships mir@thecyberexpress.com Taruna Bose Head - Digital Sales taruna@thecyberexpress.com Ashish Jaiswal Conference Manager ashish.j@thecyberexpress.com Priti Chaubey Content Strategist priti.c@thecyberexpress.com Ravi Gupta SEO Analyst ravi@thecyberexpress.com Editorial Management STAFF *Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC., The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing. Image credits: Shutterstock & Freepik
  • 7. ISSUE 02 TheCyberExpress 7 From The Editor’s DESK Artificial Intelligence: The Bridge Between Utopia and Dystopia Myths, stories, and Greek antiquities. It was believed that Hephaestus, the Greek god of metallurgy, created and programmed a giant bronze warrior named Talos to protect Crete. Talos is said to be a futuristic cybernetic creature that can think and feel. It was believed that Hephaestus created the creature as part of his project, which involved combining neurological-computer interfaces and living and non- living components into one massive being. The mythology surrounding the creation of the warrior is also said to be the first example of people thinking about the potential of AI and intelligent robots. Cut to the present, AI is all around us, and data and algorithms have become more important to our lives than we can fathom. And this is just the beginning. AI has the potential to transform the way we interact with the world around us. It can assist us in performing specific tasks based on its capabilities and improve our lives in several ways. But that’s not all. The benefits of using AI in the field of cybersecurity are numerous. It can help prevent and detect threats before they occur, improving the organisation’s efficiency. However, the increasing use of AI in the cybersecurity industry has raised concerns about the potential impact on several vectors. In this edition, we discuss AI and The Top 6 Business Risks in detail. The Cover of the magazine talks about something even more grave and how AI can become a tool for fixing a dire problem. We highlight ways of integrating data fusion and AI tools, which can, in turn, play a key role in fighting and drastically reducing the exponentially high number of people forced into modern slavery. On the better side, we talk about leveraging AI in cybersecurity education. We believe artificial Intelligence can make complex terms and topics relatively simpler, but there is still a long way to go. In our interviews, we have Chuck Brooks, President of Brooks Consulting International, discussing how AI and ML are disrupting the cybersecurity space. We also have Ash Hunt, Global Chief Information Security Officer (CISO) at the Apex Group, discussing the risk quantification, metrics, and testing risk scenarios for staying better prepared in cyber risk management. Connected devices come with much data, and the vast collection of highly sensitive data in connected vehicles necessitates an entirely new level of security – especially against ransomware, cyber war, and other cyberattacks that exploit software and hardware flaws. The issue also talks about the security of connected vehicles. Let us know what you liked the best in this issue. Reach out to us with your valuable feedback at editorial@ thecyberexpress.com. Editor-in-Chief Augustin Kurian
  • 10. ISSUE 02 TheCyberExpress 10 Voice Networks are Under Attack – is Anybody Listening? - By Brian McDonald Security Officer, Mutare, Inc. Who would have guessed that, in 2022, the humble phone would become a favorite weapon for cybercriminals intent on infiltrating high-profile organizations in order to disrupt operations, embed ransomware, advance extortion schemes, and steal customer data? Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite the technological sophistication of their own offerings, all fell victim to damaging data breaches perpetrated by criminal agents whose point of entry was through a simple phone call. This emerging threat vector has come to be known as “voice phishing” or simply, vishing. Obviously, there is nothing new about scam calls. However, voice phishing has steadily evolved into a criminal art form. DIGEST
  • 12. ISSUE 02 TheCyberExpress 12 Most commonly, the attack is perpetrated by an adversary, either working alone or as part of an organized cybercriminal gang, who first seeks out vulnerable human targets through data mining and reconnaissance calling. Once a connection is made, the impostor gains trust through psychological manipulation (social engineering) in order to extract protected information or account login credentials. Sometimes the call comes on the heels of a related email notification or text message. Other times an email or text may include a call-back number that connects the victim to a call center manned by co-conspirator agents trained in social engineering techniques. In all cases, the goal is the same: to lower the resistance of the victim through the power of the human voice connection. Employees, unlike consumers, cannot simply ignore calls from unknown sources, which makes them particularly vulnerable to socially engineered manipulation. In fact, a recent study showed that more than 37% of vishing attempts actually would succeed at extracting the desired action from unsuspecting human targets. When combined with a phishing email (hybrid phishing/vishing), the success rate rose to 75%. 2022 saw a startling 550% rise in reported enterprise vishing attacks that affected a reported 70% of all organizations, with several factors fueling this sharp acceleration. First, impostors have broadened their access to the tools of deception thanks to digitalized public sources, unprotected social media accounts, and the vast repository of stolen information found on the Dark Web. Some may add deep fake voice manipulation technology to further their deceit. And, while the transition from analog calling to Voice over Internet Protocol (VoIP) over the past decade has enabled high quality, low cost, global voice communications and collaboration, it has also super-charged the ability of nefarious criminal agents, using auto-dialers, pre-recorded messages, caller ID spoofing, generous VoIP bandwidth and cheap, untraceable overseas call centers, to reach thousands of intended victims with little effort, expenditure, or risk. DIGEST TO READ THE FULL ISSUE