Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Security Firms. Show all posts

International Initiative Targets Cybercrime

 


The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle cybercriminal networks by mapping out their relationships, infrastructure, and supply chains.

Founded with the support of key players like Banco Santander, Fortinet, Microsoft, and Paypal, the initiative has since expanded to include over 20 law enforcement agencies, private-sector security firms, financial institutions, NGOs, and academic institutions. Together, they analyse intelligence packages and profile threat actors to disrupt cybercriminal operations effectively.

Derek Manky, Chief Security Strategist at Fortinet's FortiGuard Labs, emphasises the initiative's focus on intelligence gathering and the identification of choke points and disruption opportunities. The ultimate goal is to dismantle criminal infrastructure, make arrests, and reduce the profitability of cybercrime, sending a clear message to criminals.

Sean Doyle, the lead of the Cybercrime Atlas initiative, highlights its twofold purpose: creating actionable insights and using them collaboratively to impede cybercriminal activities. Despite recent high-profile cyber attacks, such as the ransomware attack on Change Healthcare and the British Library, the initiative strives to make life more challenging for cybercriminals.

The initiative's significance is underscored by the World Economic Forum's involvement and its recognition of cybersecurity as a critical global risk. With "cyber insecurity" ranked as the fourth top short-term global risk in the WEF's Global Risks Report 2024, the initiative represents a proactive approach to address digital threats.

Moreover, the WEF has actively engaged in addressing the cyber skills gap and promoting cybersecurity resilience among organisations. At its annual meeting in Davos, discussions on ransomware disruption garnered interest from CEOs and board members, reflecting a growing awareness of cybersecurity issues beyond traditional IT circles.

Tal Goldstein, Head of Strategy at the WEF Centre for Cybersecurity, emphasises the collaborative nature of tackling cyber threats, highlighting the need for concerted efforts from companies, governments, and international organisations. Recognising the complexity of cybersecurity challenges, the initiative signals a collective response to safeguarding digital ecosystems.

All in all, the Cybercrime Atlas initiative represents a pivotal step towards combating cybercrime on a global scale. With a focus on collaboration, intelligence gathering, and disruption tactics, it aims to mitigate the growing threat posed by cybercriminals, making cyberspace safer for individuals, businesses, and organisations worldwide.


To Combat Cyber Threats, Cytech Ventures LCC and Wazuh Sign a Crucial Partnership Agreement

 

Today, almost every industry is plagued by the fear of catastrophic flaws and dangers supported by nation-states.

Cyber threats are understandable in their scope and sophistication. The lucrative nature of ransomware, automation, intellectual property theft, and business email breach drive attackers to push the frontiers of innovation and scale even as organisations continue to improve their defences.

The importance of cybersecurity to our future has never been greater. Today, it serves as the first line of protection for almost every service we depend on, including financial services, healthcare, travel, personal information, and identification.

Therefore, to combat future cyber threats, Cytech Ventures LCC and Wazuh have formed an alliance. The US-based OEM CySecurity Corp., which manufactures Darwis products, is a group company of Cytech Ventures LCC. 

Cybersecurity technologies like the Darwis honeypot, Darwis threat intel API, and XDR are integrated by Cytech Ventures LCC, a global cyber consulting firm. It has expertise in identifying blockchain vulnerabilities as well as vulnerability assessments, penetration testing, and bug bounties.

“We are very excited to partner with Wazuh. Integrating our solution with Wazuh makes our customers more secure as we become a one-stop solution for cyber security. We use Wazuh for managing security in customer places for compliance requirements like HIPPA and PCI DSS. We also incorporated file integrity monitoring (FIM) with our threat intel API to safeguard customers from malware while implementing web shell detection to protect and monitor customer web portals,” said Jeyaraman Prasanna, CEO of Cytech Ventures LCC. 

APT Cloud Scan and Web Search, Data Breach, and Dark Web Monitoring are all owned by CySecurity Corp. These dedicated SaaS solutions are successfully running in hundreds of BFSI (Banking, Finance, and Insurance) firms across multiple countries. 

APT Cloud Scan security services include vulnerability monitoring, fake mobile app monitoring, and surface area monitoring. Vulnerability monitoring scans web portals and IP addresses for security flaws. Using AI/ML, bogus mobile app monitoring detects fake apps. Finally, surface area monitoring services include anti-phishing and anti-malware monitoring, automated daily scans, and report generating.

“We are thrilled to have signed this new partnership with Cytech Ventures LCC. It is good to see that they benefit from our platform by managing security at their customers’ sites to meet compliance requirements and integrating FIM with their threat intelligence API,” commented Alberto Gonzalez, COO at Wazuh.

Security Vendors are Turning to GPT as a Key AI Technology

 

A number of businesses are utilising conversational AI technology to improve their product capabilities, including for security, despite some concerns about how generative AI chatbots like ChatGPT can be used maliciously — to create phishing campaigns or write malware. 

A large language model (LLM) called ChatGPT, created by OpenAI, uses the GPT 3 LLM and is based on a variety of large test data sets. When a user asks a simple question, ChatGPT, which can understand human language, responds with thorough explanations and can manage complex tasks like document creation and code writing. It serves as an illustration of how conversational AI can be used to organise massive amounts of data, improve user experience, and facilitate communications. 

For example, a conversational AI tool, such as ChatGPT or another option, could act as the back end of an information concierge that automates the use of threat intelligence in enterprise support, claims IT research and advisory firm Into-Tech Research. 

With Orca Security Platform, it seems like Orca Security is taking that tack. The platform's capacity to produce contextual and precise remediation plans for security alerts was improved by the incorporation of OpenAI's GPT3 API, particularly the "Da-Vinci-03" series. In the announcement, the head of data science at Orca, Itamar Golan, and the director of innovation at Orca, Lior Drihem, wrote. Before feeding the components as input to GPT3, the new pipeline preprocesses data from a security alert, including fundamental details about the risk and its contextual environment, including affected assets, attack vectors, and potential impact. The best and most useful solutions to fix the problem are then generated by the AI, according to Golan and Drihem. For teams to refer to and apply, these remediation steps can also be included in tickets, such as Jira tickets. 

Even though the AI model has the potential to produce inaccurate data (or ambiguous results), Drihem and Golan claim that "the benefits of utilising GPT3's natural language generation capabilities outweigh any potential risks, and have seen significant improvements in the efficiency and effectiveness of our remediation efforts." 

Orca Security has previously used language models in their work. To improve the remediation information customers receive regarding infosec risks, the company recently integrated GPT3 into its cloud security platform. 

"By fine-tuning these powerful language models with our own security data sets, we have been able to improve the detail and accuracy of our remediation steps — giving you a much better remediation plan and assisting you to optimally solve the issue as fast as possible," Golan and Drihem added. 

Utilizing LLM & AI for applications 

Orca Security joins other businesses that offer language models as part of their product line. This week, Gupshup introduced Auto Bot Builder, a tool that uses GPT-3 to assist businesses in creating their own sophisticated conversational chatbots. Using content from the enterprise website, documents, message logs, product catalogues, databases, and other corporate systems, Auto Bot Builder creates chatbots tailored to the enterprise's unique requirements. The information is processed using GPT-3 LLM (Large Language Model), and it is then fine-tuned with proprietary industry-specific models. Businesses can use Auto Bot Builder to create chatbots for customer support, product discovery, product recommendations, shopping advice, and lead generation in marketing. 

These chatbots are different from ChatGPT, a general-purpose chatbot, but they share with ChatGPT the ability to communicate with end users at a "exceptionally high degree of language capability," according to Gupshup. 

ChatGPT is also being used by the cryptocurrency community to develop software like trading bots and cryptocurrency blogs. Competitive intelligence analyst Jerrod Piker from Deep Instinct wrote in an email. Examples include creating a sample smart contract using ChatGPT and creating a trading bot to help automate the process of buying and selling cryptocurrencies by identifying entry and exit points. 

The idea of a generative AI chatbot that can respond to questions is not new, but Casey Ellis, founder and CTO of Bugcrowd, notes that ChatGPT stands out from the competition due to the variety of topics it can handle and its usability.