LATEST CYBER SECURITY NEWS AND VIEWS

Home > News

Data Pollution – Risks and Challenges in AI Datasets 

Posted on

AI has been a hot topic in the media lately and is influencing every sector as well as our daily lives without us realising just how much. There are various systems that are driven by AI, most notable being virtual assistants (Siri, Google Assistant, Alexa, etc.) but also in healthcare to detect diseases earlier, in […]

Read full post

The Dark Side of AI: How Cybercriminals Exploit Artificial Intelligence

Posted on

Cybercriminals and security professionals are in an AI arms race. As quickly as cybersecurity teams on the front lines utilise AI to speed up their response to real-time threats, criminals are using AI to automate and refine their attacks. Tools that generate images, or conversational AI, are improving their quality and accuracy at increasing speeds. […]

Read full post

The Evolution of Prompt Injection in AI Models

Posted on

With the ever-increasing adoption of AI models across the globe, both within organisations and personal use, for some, efficiency and performance are though the roof. However, with this new technology brings a peaked interest from the cyber security industry and the shared gospel of “how can I break this?” has been ringing in their ears […]

Read full post

Ethical Implications of Manipulating AI Inputs 

Posted on

In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. Immanuel Kant  Introduction   Over the past decade the term ‘Artificial Intelligence’ (AI) has made efforts to remove itself from a buzzword used in startup elevator pitches to expanding onto a […]

Read full post

Prism Infosec launches LuxisAI, its Cyber Security as a Service (CSaaS) platform

Posted on

Prism Infosec is excited to announce the launch of our Cyber Security as a Service (CSaaS) platform, LuxisAI. LuxisAI provides our customers with a fast, simple and effective platform from which to access our suite of expert-delivered cyber security services. Through LuxisAI, our customers can quickly engage with our services and gain immediate access to […]

Read full post

Breaking PDFs with Server-Side Shenanigans

Posted on

Breaking PDFs

Introduction Generating PDFs from user supplied content is very common functionality within modern day Web Applications. Be it producing a receipt for an online purchase or generating a report based on user supplied content collected by the web application. There is endless application for this functionality. Dynamic PDF generation holds significant potential for a wide […]

Read full post

Unveiling the Virtual Battlefield: A Journey into Game Hacking and Reverse Engineering

Posted on

In the ever-evolving realm of digital entertainment, where creativity converges with cutting-edge technology, a subversive art form emerges — game hacking. Beyond the pixels and polygons lies a labyrinth of code waiting to be deciphered, manipulated, and reimagined. This intriguing practice not only kindles the flames of curiosity but also serves as a pivotal gateway […]

Read full post

WordPress Plugins: Don’t Let Vulnerabilities Crash Your Site’s Party

Posted on

Like many management systems, WordPress offers extensions to its core functionality that are created by the community and third-party providers. While these extensions are essential for the thriving WordPress ecosystem, the influx of new code introduces fresh vulnerabilities. Prism Infosec assessed several open-source extensions and found a number of issues that could pose a risk […]

Read full post

Launching Cyber Maturity Assessment service to boost security baselining

Posted on

Our Cyber Maturity Assessment is mapped to the National Institute of Standards and technology (NIST) Cybersecurity Framework and covers all five core areas (identify, protect, detect, respond and recover) with maturity graded using five maturity rankings (initial, developing, defined, managed or optimised). Our team of GRC specialist consultants carry out interviews, review documents, and observe current practices […]

Read full post

Cyber hygiene and how to improve cyber resilience across your workforce 

Posted on

In the world of cybersecurity, the saying goes: people are your first line of defence. Empowering employees through comprehensive cybersecurity training, companies can prevent cyber attacks caused by human error. There’s a great deal of FUD (fear, uncertainty and doubt) spread about by the security industry concerning the threats facing the business but the truth […]

Read full post

FILTER RESULTS

Latest tweets

Data #leakage is just one of numerous risks associated with #GenAI necessitating the use of an #AI #risk framework, as Phil Robinson explains via  @governance_and. #cybersecurity

We interview Phil Robinson, Principal Security Consultant and Founder at @prisminfosec, who shares his views on ethical hackers and the latest ransomware trends.

Sign up to our newsletter

  • Fields marked with an * are mandatory

  • This field is for validation purposes and should be left unchanged.