AI has been a hot topic in the media lately and is influencing every sector as well as our daily lives without us realising just how much. There are various systems that are driven by AI, most notable being virtual assistants (Siri, Google Assistant, Alexa, etc.) but also in healthcare to detect diseases earlier, in […]
Cybercriminals and security professionals are in an AI arms race. As quickly as cybersecurity teams on the front lines utilise AI to speed up their response to real-time threats, criminals are using AI to automate and refine their attacks. Tools that generate images, or conversational AI, are improving their quality and accuracy at increasing speeds. […]
With the ever-increasing adoption of AI models across the globe, both within organisations and personal use, for some, efficiency and performance are though the roof. However, with this new technology brings a peaked interest from the cyber security industry and the shared gospel of “how can I break this?” has been ringing in their ears […]
In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. Immanuel Kant Introduction Over the past decade the term ‘Artificial Intelligence’ (AI) has made efforts to remove itself from a buzzword used in startup elevator pitches to expanding onto a […]
Prism Infosec is excited to announce the launch of our Cyber Security as a Service (CSaaS) platform, LuxisAI. LuxisAI provides our customers with a fast, simple and effective platform from which to access our suite of expert-delivered cyber security services. Through LuxisAI, our customers can quickly engage with our services and gain immediate access to […]
Introduction Generating PDFs from user supplied content is very common functionality within modern day Web Applications. Be it producing a receipt for an online purchase or generating a report based on user supplied content collected by the web application. There is endless application for this functionality. Dynamic PDF generation holds significant potential for a wide […]
In the ever-evolving realm of digital entertainment, where creativity converges with cutting-edge technology, a subversive art form emerges — game hacking. Beyond the pixels and polygons lies a labyrinth of code waiting to be deciphered, manipulated, and reimagined. This intriguing practice not only kindles the flames of curiosity but also serves as a pivotal gateway […]
Like many management systems, WordPress offers extensions to its core functionality that are created by the community and third-party providers. While these extensions are essential for the thriving WordPress ecosystem, the influx of new code introduces fresh vulnerabilities. Prism Infosec assessed several open-source extensions and found a number of issues that could pose a risk […]
Our Cyber Maturity Assessment is mapped to the National Institute of Standards and technology (NIST) Cybersecurity Framework and covers all five core areas (identify, protect, detect, respond and recover) with maturity graded using five maturity rankings (initial, developing, defined, managed or optimised). Our team of GRC specialist consultants carry out interviews, review documents, and observe current practices […]
In the world of cybersecurity, the saying goes: people are your first line of defence. Empowering employees through comprehensive cybersecurity training, companies can prevent cyber attacks caused by human error. There’s a great deal of FUD (fear, uncertainty and doubt) spread about by the security industry concerning the threats facing the business but the truth […]