LATEST CYBER SECURITY NEWS AND VIEWS

Home > News

Ethical Implications of Manipulating AI Inputs 

Posted on

In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. Immanuel Kant  Introduction   Over the past decade the term ‘Artificial Intelligence’ (AI) has made efforts to remove itself from a buzzword used in startup elevator pitches to expanding onto a […]

Read full post

Prism Infosec launches LuxisAI, its Cyber Security as a Service (CSaaS) platform

Posted on

Prism Infosec is excited to announce the launch of our Cyber Security as a Service (CSaaS) platform, LuxisAI. LuxisAI provides our customers with a fast, simple and effective platform from which to access our suite of expert-delivered cyber security services. Through LuxisAI, our customers can quickly engage with our services and gain immediate access to […]

Read full post

Breaking PDFs with Server-Side Shenanigans

Posted on

Breaking PDFs

Introduction Generating PDFs from user supplied content is very common functionality within modern day Web Applications. Be it producing a receipt for an online purchase or generating a report based on user supplied content collected by the web application. There is endless application for this functionality. Dynamic PDF generation holds significant potential for a wide […]

Read full post

Unveiling the Virtual Battlefield: A Journey into Game Hacking and Reverse Engineering

Posted on

In the ever-evolving realm of digital entertainment, where creativity converges with cutting-edge technology, a subversive art form emerges — game hacking. Beyond the pixels and polygons lies a labyrinth of code waiting to be deciphered, manipulated, and reimagined. This intriguing practice not only kindles the flames of curiosity but also serves as a pivotal gateway […]

Read full post

WordPress Plugins: Don’t Let Vulnerabilities Crash Your Site’s Party

Posted on

Like many management systems, WordPress offers extensions to its core functionality that are created by the community and third-party providers. While these extensions are essential for the thriving WordPress ecosystem, the influx of new code introduces fresh vulnerabilities. Prism Infosec assessed several open-source extensions and found a number of issues that could pose a risk […]

Read full post

Launching Cyber Maturity Assessment service to boost security baselining

Posted on

Our Cyber Maturity Assessment is mapped to the National Institute of Standards and technology (NIST) Cybersecurity Framework and covers all five core areas (identify, protect, detect, respond and recover) with maturity graded using five maturity rankings (initial, developing, defined, managed or optimised). Our team of GRC specialist consultants carry out interviews, review documents, and observe current practices […]

Read full post

Cyber hygiene and how to improve cyber resilience across your workforce 

Posted on

In the world of cybersecurity, the saying goes: people are your first line of defence. Empowering employees through comprehensive cybersecurity training, companies can prevent cyber attacks caused by human error. There’s a great deal of FUD (fear, uncertainty and doubt) spread about by the security industry concerning the threats facing the business but the truth […]

Read full post

Prism Infosec Hires Bradley Knight in the Role of Chief Operating Officer

Posted on

Cyber security consultant Prism Infosec, which has offices in Cheltenham and Liverpool, has welcomed Bradley Knight as its new chief operating officer (COO). Knight holds a forensic computing and security degree from Bournemouth University and worked most recently at Resillion as operations director for UK Cyber. Before that role, he led the offensive security team at MTI […]

Read full post

Why Failing to Document Risk is a Risky Strategy

Posted on

Phil Robinson Explores why Failing to document risk leaves businesses vulnerable to cyber threats and costly consequences. Understanding risk and its potential impact can help the business prepare for and survive the realization of its worst fears. It’s a pre-emptive measure and can head off threats and provide a way to control those risks continuously. […]

Read full post

WebP’s Weak Spot: Unveiling the Hidden Vulnerability

Posted on

Last month (September 2023), Google reported that a newly discovered security issue in Google Chrome had been found, it described as a ‘heap buffer overflow in WebP within Google Chrome’ and tracked under CVE-2023-4863. This was first thought to be just another minor bug found within the browser – something to be addressed in a future […]

Read full post

FILTER RESULTS

Latest tweets

Data #leakage is just one of numerous risks associated with #GenAI necessitating the use of an #AI #risk framework, as Phil Robinson explains via  @governance_and. #cybersecurity

We interview Phil Robinson, Principal Security Consultant and Founder at @prisminfosec, who shares his views on ethical hackers and the latest ransomware trends.

Sign up to our newsletter

  • Fields marked with an * are mandatory

  • This field is for validation purposes and should be left unchanged.