SlideShare a Scribd company logo
1 of 12
Download to read offline
ISSUE 02 TheCyberExpress
2
Capabilities
Darkweb and Open Internet Monitoring
Attack Surface Detection &
Hunting (DRPS)
Third Party Cyber Scoring
Compromised credentials
Sensitive data leakage
Executive brand protection monitoring
Open-Source Intelligence
Public facing assets
Vulnerable assets
Code Leakage (e.g
GitHub/bitbucket)
Cloud buckets S3, Azure
Malware campaigns
Vendor risk score
Derived from Darkweb, deep web,
attack surface, public breaches,
disclosures, etc
Cybercrime Intelligence
Brand Reputation Monitoring (DRPS)
Threat Intelligence
Advisories on 400+ threat actors and
700+ malware operators
Monitor 80% of Cybercrime markets
Cybercrime conversations/mentions
in forums and markets
Fake/Typo Squatted Domains and
Fake Content
Fake Domains and Fake Content
Fake app detection
Phishing URLs
Take downs
Social media monitoring
IoCs
Security Advisories
Compromised Cards
BINs
ATM PINs
ComprehensiveDigitalRisk
ProtectionwithCybleVision
© 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
ISSUE 02
TheCyberExpress 3
01
02
03
04
Scan QR code and get
External Threat Profile
Report customized for
your organization that
includes:
Knowyour
organization’s
Darkweb
Exposure
Make sure that your business
continuity, compliance and
operational availability is not
at stake
Overview of vulnerabilities in your
digital risk footprint
Risk assessment of your attack
surface and threat landscape
Unique Risk Score as per your
darkweb exposure
Critical information about your
leaked data and security posture
Secure your business
using Cyble’s unified
threat intelligence
platform that offers
6 unique capabilities and
32 research parameters
to deliver 360-degree
intelligence
TO GET THE REPORT!
© 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
ISSUE 02 TheCyberExpress
4
Contents
34
Artificial Intelligence and
The Top 6 Business Risks
CYBERVILLE
20
Biometric security
will be vital in a
postquantum future
FORESIGHT
10
Voice Networks are Under
Attack – is Anybody
Listening?
DIGEST
14
Behavioral Psychology,
A Boon For Insider Risk
Mitigation
INSIDER
7
FROM THE EDITOR
Past and Future in the
same frame
ISSUE 02
TheCyberExpress 5
46
56
74
80
Using AI to Fight Human
Trafficking and Modern
Slavery… Can We Win?
Artificial Intelligence, Genuine
Training: Can Ai Help In
Learning Cybersecurity?
AI Arms Race: Hackers vs
Cybersecurity Professional, a
Battle for Digital Dominance
The Monthly Round-Up
THE COVER
ACADEMIA
BOTTOM LINE
NUGGETS
24
REGISTER
Risk Management Is
Nothing But Decision
Management
62 68
HOT SEAT SCOOP
How Secure Is Your
Connected Vehicle?
Quantum Cybersecurity
will Revolutionize the
Industry
ISSUE 02 TheCyberExpress
6
Augustin Kurian
Editor-in-Chief
editor@thecyberexpress.com
Chandu Gopalakrishnan
Executive Editor
chandu@thecyberexpress.com
Avantika Chopra
Senior Sub-Editor
avantika@thecyberexpress.com
Vishwa Pandagle
Journalist
vishwa@thecyberexpress.com
Ashish Khaitan
Journalist
ashish@thecyberexpress.com
Vittal Chowdry
Senior Graphic Designer
vittal@thecyberexpress.com
Rajashakher Intha
Head - Marketing & Sales
raj@thecyberexpress.com
Mir Ali
Head - Partnerships
mir@thecyberexpress.com
Taruna Bose
Head - Digital Sales
taruna@thecyberexpress.com
Ashish Jaiswal
Conference Manager
ashish.j@thecyberexpress.com
Priti Chaubey
Content Strategist
priti.c@thecyberexpress.com
Ravi Gupta
SEO Analyst
ravi@thecyberexpress.com
Editorial Management
STAFF
*Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC.,
The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher.
Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The
ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers
in writing.
Image credits: Shutterstock & Freepik
ISSUE 02
TheCyberExpress 7
From The
Editor’s DESK
Artificial Intelligence: The
Bridge Between Utopia and
Dystopia
Myths, stories, and Greek
antiquities.
It was believed that
Hephaestus, the Greek god
of metallurgy, created and
programmed a giant bronze
warrior named Talos to protect
Crete. Talos is said to be a
futuristic cybernetic creature
that can think and feel.
It was believed that
Hephaestus created the
creature as part of his project,
which involved combining
neurological-computer
interfaces and living and non-
living components into one
massive being. The mythology
surrounding the creation of
the warrior is also said to be
the first example of people
thinking about the potential of
AI and intelligent robots.
Cut to the present, AI is all
around us, and data and
algorithms have become more
important to our lives than we
can fathom. And this is just the
beginning.
AI has the potential to
transform the way we interact
with the world around us. It
can assist us in performing
specific tasks based on its
capabilities and improve our
lives in several ways. But that’s
not all. The benefits of using
AI in the field of cybersecurity
are numerous. It can help
prevent and detect threats
before they occur, improving
the organisation’s efficiency.
However, the increasing use
of AI in the cybersecurity
industry has raised concerns
about the potential impact on
several vectors. In this edition,
we discuss AI and The Top 6
Business Risks in detail.
The Cover of the magazine
talks about something even
more grave and how AI can
become a tool for fixing a dire
problem. We highlight ways
of integrating data fusion and
AI tools, which can, in turn,
play a key role in fighting
and drastically reducing the
exponentially high number of
people forced into modern
slavery.
On the better side, we
talk about leveraging AI in
cybersecurity education. We
believe artificial Intelligence
can make complex terms and
topics relatively simpler, but
there is still a long way to go.
In our interviews, we have
Chuck Brooks, President
of Brooks Consulting
International, discussing how
AI and ML are disrupting
the cybersecurity space. We
also have Ash Hunt, Global
Chief Information Security
Officer (CISO) at the Apex
Group, discussing the risk
quantification, metrics, and
testing risk scenarios for
staying better prepared in
cyber risk management.
Connected devices come
with much data, and the vast
collection of highly sensitive
data in connected vehicles
necessitates an entirely new
level of security – especially
against ransomware, cyber
war, and other cyberattacks
that exploit software and
hardware flaws. The issue also
talks about the security of
connected vehicles.
Let us know what you liked
the best in this issue. Reach
out to us with your valuable
feedback at editorial@
thecyberexpress.com.
Editor-in-Chief
Augustin Kurian
ISSUE 02 TheCyberExpress
8
ISSUE 02
TheCyberExpress 9
ISSUE 02 TheCyberExpress
10
Voice Networks
are Under Attack –
is Anybody
Listening?
- By Brian McDonald
Security Officer, Mutare, Inc.
Who would have guessed that, in 2022, the humble phone
would become a favorite weapon for cybercriminals intent
on infiltrating high-profile organizations in order to disrupt
operations, embed ransomware, advance extortion
schemes, and steal customer data?
Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite
the technological sophistication of their own offerings,
all fell victim to damaging data breaches perpetrated by
criminal agents whose point of entry was through a simple
phone call. This emerging threat vector has come to be
known as “voice phishing” or simply, vishing.
Obviously, there is nothing new about scam calls. However,
voice phishing has steadily evolved into a criminal art form.
DIGEST
ISSUE 02
TheCyberExpress 11
ISSUE 02 TheCyberExpress
12
Most commonly, the attack is perpetrated by an
adversary, either working alone or as part of an organized
cybercriminal gang, who first seeks out vulnerable human
targets through data mining and reconnaissance calling.
Once a connection is made, the impostor gains trust
through psychological manipulation (social engineering)
in order to extract protected information or account
login credentials. Sometimes the call comes on the
heels of a related email notification or text message.
Other times an email or text may include a call-back
number that connects the victim to a call center manned
by co-conspirator agents trained in social engineering
techniques. In all cases, the goal is the same: to lower the
resistance of the victim through the power of the human
voice connection.
Employees, unlike consumers, cannot simply ignore calls
from unknown sources, which makes them particularly
vulnerable to socially engineered manipulation. In fact,
a recent study showed that more than 37% of vishing
attempts actually would succeed at extracting the
desired action from unsuspecting human targets. When
combined with a phishing email (hybrid phishing/vishing),
the success rate rose to 75%.
2022 saw a startling 550% rise in reported enterprise
vishing attacks that affected a reported 70% of all
organizations, with several factors fueling this sharp
acceleration.
First, impostors have broadened their access to the
tools of deception thanks to digitalized public sources,
unprotected social media accounts, and the vast
repository of stolen information found on the Dark Web.
Some may add deep fake voice manipulation technology
to further their deceit. And, while the transition from
analog calling to Voice over Internet Protocol (VoIP)
over the past decade has enabled high quality, low
cost, global voice communications and collaboration, it
has also super-charged the ability of nefarious criminal
agents, using auto-dialers, pre-recorded messages,
caller ID spoofing, generous VoIP bandwidth and cheap,
untraceable overseas call centers, to reach thousands of
intended victims with little effort, expenditure, or risk.
DIGEST
TO READ THE FULL ISSUE

More Related Content

Similar to Here are a few key points about the rising threat of voice phishing (vishing) attacks:- Vishing attacks involve impersonating legitimate organizations through phone calls to trick victims into providing sensitive information or account credentials. The goal is to lower victims' defenses through social engineering and manipulation. - Employees are particularly vulnerable as they can't ignore calls from unknown numbers like consumers can. Over 37% of vishing attempts succeed according to one study.- Criminals have more tools at their disposal like public data, social media, stolen info on dark web to research targets and build credibility as impersonations. Deepfakes may also be used.- Transition to VoIP calling has enabled high quality, low cost global voice

The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfCiente
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdfinsightssuccess2
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces Edology
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 

Similar to Here are a few key points about the rising threat of voice phishing (vishing) attacks:- Vishing attacks involve impersonating legitimate organizations through phone calls to trick victims into providing sensitive information or account credentials. The goal is to lower victims' defenses through social engineering and manipulation. - Employees are particularly vulnerable as they can't ignore calls from unknown numbers like consumers can. Over 37% of vishing attempts succeed according to one study.- Criminals have more tools at their disposal like public data, social media, stolen info on dark web to research targets and build credibility as impersonations. Deepfakes may also be used.- Transition to VoIP calling has enabled high quality, low cost global voice (20)

The Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdfThe Role Of Artificial Intelligence In Cybersecurity.pdf
The Role Of Artificial Intelligence In Cybersecurity.pdf
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Cyber security
Cyber securityCyber security
Cyber security
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Here are a few key points about the rising threat of voice phishing (vishing) attacks:- Vishing attacks involve impersonating legitimate organizations through phone calls to trick victims into providing sensitive information or account credentials. The goal is to lower victims' defenses through social engineering and manipulation. - Employees are particularly vulnerable as they can't ignore calls from unknown numbers like consumers can. Over 37% of vishing attempts succeed according to one study.- Criminals have more tools at their disposal like public data, social media, stolen info on dark web to research targets and build credibility as impersonations. Deepfakes may also be used.- Transition to VoIP calling has enabled high quality, low cost global voice

  • 1.
  • 2. ISSUE 02 TheCyberExpress 2 Capabilities Darkweb and Open Internet Monitoring Attack Surface Detection & Hunting (DRPS) Third Party Cyber Scoring Compromised credentials Sensitive data leakage Executive brand protection monitoring Open-Source Intelligence Public facing assets Vulnerable assets Code Leakage (e.g GitHub/bitbucket) Cloud buckets S3, Azure Malware campaigns Vendor risk score Derived from Darkweb, deep web, attack surface, public breaches, disclosures, etc Cybercrime Intelligence Brand Reputation Monitoring (DRPS) Threat Intelligence Advisories on 400+ threat actors and 700+ malware operators Monitor 80% of Cybercrime markets Cybercrime conversations/mentions in forums and markets Fake/Typo Squatted Domains and Fake Content Fake Domains and Fake Content Fake app detection Phishing URLs Take downs Social media monitoring IoCs Security Advisories Compromised Cards BINs ATM PINs ComprehensiveDigitalRisk ProtectionwithCybleVision © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  • 3. ISSUE 02 TheCyberExpress 3 01 02 03 04 Scan QR code and get External Threat Profile Report customized for your organization that includes: Knowyour organization’s Darkweb Exposure Make sure that your business continuity, compliance and operational availability is not at stake Overview of vulnerabilities in your digital risk footprint Risk assessment of your attack surface and threat landscape Unique Risk Score as per your darkweb exposure Critical information about your leaked data and security posture Secure your business using Cyble’s unified threat intelligence platform that offers 6 unique capabilities and 32 research parameters to deliver 360-degree intelligence TO GET THE REPORT! © 2022 Cyble Inc. All Rights Reserved. contact@cyble.com l +1 678 379 3241 l www.cyble.com
  • 4. ISSUE 02 TheCyberExpress 4 Contents 34 Artificial Intelligence and The Top 6 Business Risks CYBERVILLE 20 Biometric security will be vital in a postquantum future FORESIGHT 10 Voice Networks are Under Attack – is Anybody Listening? DIGEST 14 Behavioral Psychology, A Boon For Insider Risk Mitigation INSIDER 7 FROM THE EDITOR Past and Future in the same frame
  • 5. ISSUE 02 TheCyberExpress 5 46 56 74 80 Using AI to Fight Human Trafficking and Modern Slavery… Can We Win? Artificial Intelligence, Genuine Training: Can Ai Help In Learning Cybersecurity? AI Arms Race: Hackers vs Cybersecurity Professional, a Battle for Digital Dominance The Monthly Round-Up THE COVER ACADEMIA BOTTOM LINE NUGGETS 24 REGISTER Risk Management Is Nothing But Decision Management 62 68 HOT SEAT SCOOP How Secure Is Your Connected Vehicle? Quantum Cybersecurity will Revolutionize the Industry
  • 6. ISSUE 02 TheCyberExpress 6 Augustin Kurian Editor-in-Chief editor@thecyberexpress.com Chandu Gopalakrishnan Executive Editor chandu@thecyberexpress.com Avantika Chopra Senior Sub-Editor avantika@thecyberexpress.com Vishwa Pandagle Journalist vishwa@thecyberexpress.com Ashish Khaitan Journalist ashish@thecyberexpress.com Vittal Chowdry Senior Graphic Designer vittal@thecyberexpress.com Rajashakher Intha Head - Marketing & Sales raj@thecyberexpress.com Mir Ali Head - Partnerships mir@thecyberexpress.com Taruna Bose Head - Digital Sales taruna@thecyberexpress.com Ashish Jaiswal Conference Manager ashish.j@thecyberexpress.com Priti Chaubey Content Strategist priti.c@thecyberexpress.com Ravi Gupta SEO Analyst ravi@thecyberexpress.com Editorial Management STAFF *Responsible for selection of news under PRB Act. Printed & Published by Augustin Kurian, The Cyber Express LLC., The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing. Image credits: Shutterstock & Freepik
  • 7. ISSUE 02 TheCyberExpress 7 From The Editor’s DESK Artificial Intelligence: The Bridge Between Utopia and Dystopia Myths, stories, and Greek antiquities. It was believed that Hephaestus, the Greek god of metallurgy, created and programmed a giant bronze warrior named Talos to protect Crete. Talos is said to be a futuristic cybernetic creature that can think and feel. It was believed that Hephaestus created the creature as part of his project, which involved combining neurological-computer interfaces and living and non- living components into one massive being. The mythology surrounding the creation of the warrior is also said to be the first example of people thinking about the potential of AI and intelligent robots. Cut to the present, AI is all around us, and data and algorithms have become more important to our lives than we can fathom. And this is just the beginning. AI has the potential to transform the way we interact with the world around us. It can assist us in performing specific tasks based on its capabilities and improve our lives in several ways. But that’s not all. The benefits of using AI in the field of cybersecurity are numerous. It can help prevent and detect threats before they occur, improving the organisation’s efficiency. However, the increasing use of AI in the cybersecurity industry has raised concerns about the potential impact on several vectors. In this edition, we discuss AI and The Top 6 Business Risks in detail. The Cover of the magazine talks about something even more grave and how AI can become a tool for fixing a dire problem. We highlight ways of integrating data fusion and AI tools, which can, in turn, play a key role in fighting and drastically reducing the exponentially high number of people forced into modern slavery. On the better side, we talk about leveraging AI in cybersecurity education. We believe artificial Intelligence can make complex terms and topics relatively simpler, but there is still a long way to go. In our interviews, we have Chuck Brooks, President of Brooks Consulting International, discussing how AI and ML are disrupting the cybersecurity space. We also have Ash Hunt, Global Chief Information Security Officer (CISO) at the Apex Group, discussing the risk quantification, metrics, and testing risk scenarios for staying better prepared in cyber risk management. Connected devices come with much data, and the vast collection of highly sensitive data in connected vehicles necessitates an entirely new level of security – especially against ransomware, cyber war, and other cyberattacks that exploit software and hardware flaws. The issue also talks about the security of connected vehicles. Let us know what you liked the best in this issue. Reach out to us with your valuable feedback at editorial@ thecyberexpress.com. Editor-in-Chief Augustin Kurian
  • 10. ISSUE 02 TheCyberExpress 10 Voice Networks are Under Attack – is Anybody Listening? - By Brian McDonald Security Officer, Mutare, Inc. Who would have guessed that, in 2022, the humble phone would become a favorite weapon for cybercriminals intent on infiltrating high-profile organizations in order to disrupt operations, embed ransomware, advance extortion schemes, and steal customer data? Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite the technological sophistication of their own offerings, all fell victim to damaging data breaches perpetrated by criminal agents whose point of entry was through a simple phone call. This emerging threat vector has come to be known as “voice phishing” or simply, vishing. Obviously, there is nothing new about scam calls. However, voice phishing has steadily evolved into a criminal art form. DIGEST
  • 12. ISSUE 02 TheCyberExpress 12 Most commonly, the attack is perpetrated by an adversary, either working alone or as part of an organized cybercriminal gang, who first seeks out vulnerable human targets through data mining and reconnaissance calling. Once a connection is made, the impostor gains trust through psychological manipulation (social engineering) in order to extract protected information or account login credentials. Sometimes the call comes on the heels of a related email notification or text message. Other times an email or text may include a call-back number that connects the victim to a call center manned by co-conspirator agents trained in social engineering techniques. In all cases, the goal is the same: to lower the resistance of the victim through the power of the human voice connection. Employees, unlike consumers, cannot simply ignore calls from unknown sources, which makes them particularly vulnerable to socially engineered manipulation. In fact, a recent study showed that more than 37% of vishing attempts actually would succeed at extracting the desired action from unsuspecting human targets. When combined with a phishing email (hybrid phishing/vishing), the success rate rose to 75%. 2022 saw a startling 550% rise in reported enterprise vishing attacks that affected a reported 70% of all organizations, with several factors fueling this sharp acceleration. First, impostors have broadened their access to the tools of deception thanks to digitalized public sources, unprotected social media accounts, and the vast repository of stolen information found on the Dark Web. Some may add deep fake voice manipulation technology to further their deceit. And, while the transition from analog calling to Voice over Internet Protocol (VoIP) over the past decade has enabled high quality, low cost, global voice communications and collaboration, it has also super-charged the ability of nefarious criminal agents, using auto-dialers, pre-recorded messages, caller ID spoofing, generous VoIP bandwidth and cheap, untraceable overseas call centers, to reach thousands of intended victims with little effort, expenditure, or risk. DIGEST TO READ THE FULL ISSUE