Even the most intelligent of us are being duped by AI-powered scams, sneaky malware is hiding in well-known software, and hackers are breaking into the setups of other hackers. On the other hand, while large corporations rush to address new security flaws, the good guys are dismantling shady chat rooms and secret online markets. Are you curious about who is hacking whom, how they do it, and what is being done to stop them?

Stay tuned—the scoop is in this recap. Since December 2022, the Russia-affiliated Turla group has been spying on military and government targets in Afghanistan and India. ZIP archives and corrupted Microsoft Office documents have been used by new phishing campaigns to get around email defenses.

Cybercriminals are using generative artificial intelligence (AI) to create fake content and carry out large-scale fraud, according to a warning from the FBI. In order to protect against low-level Bluetooth Low Energy (BLE) attacks, researchers have developed a new jamming technique called VaktBLE. Update your software right away to stay safe because some well-known programs have major security vulnerabilities.

The list includes — CVE-2024-41713 (Mitel MiCollab), CVE- 2024-51378 (CyberPanel), CVE -2023-45727 (Proself) U.S. authorities have arrested a 19-year-old teenager named Remington Goy Ogletree (aka remi) for his role in the Scattered Spider cybercrime syndicate. The accusations follow the indictment of five additional members of the notorious hacking group.

Gravy Analytics, a Virginia-based company, and its subsidiary Venntel have been prohibited by the FTC from tracking and selling users' sensitive location data. Additionally, the FTC announced an enforcement action against IntelliVision Technologies, a facial recognition company. In this webinar, Silverfort's CISO, John Paul Cunningham, will teach you how to bolster your defenses.

Examine common vulnerabilities, contemporary threats, methods for identifying hidden risks, and approaches for coordinating security efforts with corporate objectives. We'll demonstrate how to find hidden accounts, obtain complete visibility into user activity, implement least privilege policies, and strengthen your security posture to safeguard the vital resources of your company. Members of the security community are welcome to attend the free webinar, which is hosted by Silverfort.

Go to silverfort.com for additional details.