LATEST CYBER SECURITY NEWS AND VIEWS

Home > News

Understanding the Difference Between Red Teams and Penetration Testing in Cybersecurity

Posted on

Penetration Testing and Red Teaming are both valuable, important, and focussed in their own ways. Too often Penetration Tests are used to assess a system and it is a rinse and repeat of the previous year’s test results, and the organisation states that they have documented and accepted the risks often due to budgetary reasons […]

Read full post

The Value of Red Teams – Delivering Impact through Analogies

Posted on

In this blog post, we will explore how red teaming helps identify and then translate intricate technical risks into comprehensible business language, ensuring that stakeholders understand the implications and can take appropriate actions to safeguard their organisations. Understanding Red Teaming Red teaming is a structured process where cybersecurity professionals simulate real world threats to help […]

Read full post

Prism Infosec launches PULSE agile red team engagement service

Posted on

Prism Infosec, the independent cybersecurity consultancy, has announced the launch of its innovative PULSE testing service to enable organisations which may not have the bandwidth or resource to dedicate to a full-scale red team exercise to assess their defence capabilities against real-world threats. PULSE addresses the gap that currently exists between penetration testing and red […]

Read full post

WordPress Plugins: AI-dentifying Chatbot Weak Spots

Posted on

AI chatbots have become increasingly prevalent across various industries due to their ability to simulate human-like conversations and perform a range of tasks. This trend is evident in the WordPress ecosystem, where AI chatbot plugins are becoming widely adopted to enhance website functionality and user engagement. Prism Infosec reviewed the security postures of several open-source […]

Read full post

The Dark side of AI Part 2: Big brother  

Posted on

AI: Data source or data sink? The idea of artificial intelligence is not a new one. For decades, people have been finding ways to emulate the pliable nature of the human brain, with machine learning being mankind’s latest attempt. Artificial intelligence models are expected to be learn how to form appropriate responses to given set […]

Read full post

Exploring Chat Injection Attacks in AI Systems

Posted on

Introduction to AI Chat Systems What are they? AI powered chat systems, often referred to as chatbots or conversational AI, are computer programs that are designed to simulate human conversation and interaction using artificial intelligence (AI). They can understand and respond to text or voice input from users and it make it seem like you […]

Read full post

CrowdStrike Incident and Recovery Steps

Posted on

The recent Crowdstrike incident has caused significant disruptions across the internet, leading to widespread outages. This issue affects windows users worldwide after a CrowdStrike update was pushed, resulting in blue screen errors. The issue occurred due to a defect in a content update for Microsoft users within CrowdStrike. Manual Recovery Steps One of our consultants, […]

Read full post

How AI is Transforming Cyber Threat Detection and Prevention

Posted on

The number of global cyber-attacks is increasing each year at a rapid rate. According to a study by Cybersecurity Ventures, in 2023 a cyberattack took place every 39 seconds, or over 2,200 times per day. This is a 12.8% increase from 2022. Attackers are getting more sophisticated and are increasingly using AI tools to automate […]

Read full post

Data Pollution – Risks and Challenges in AI Datasets 

Posted on

AI has been a hot topic in the media lately and is influencing every sector as well as our daily lives without us realising just how much. There are various systems that are driven by AI, most notable being virtual assistants (Siri, Google Assistant, Alexa, etc.) but also in healthcare to detect diseases earlier, in […]

Read full post

The Dark Side of AI: How Cybercriminals Exploit Artificial Intelligence

Posted on

Cybercriminals and security professionals are in an AI arms race. As quickly as cybersecurity teams on the front lines utilise AI to speed up their response to real-time threats, criminals are using AI to automate and refine their attacks. Tools that generate images, or conversational AI, are improving their quality and accuracy at increasing speeds. […]

Read full post

FILTER RESULTS

Latest tweets

Data #leakage is just one of numerous risks associated with #GenAI necessitating the use of an #AI #risk framework, as Phil Robinson explains via  @governance_and. #cybersecurity

We interview Phil Robinson, Principal Security Consultant and Founder at @prisminfosec, who shares his views on ethical hackers and the latest ransomware trends.

Sign up to our newsletter

  • Fields marked with an * are mandatory

  • This field is for validation purposes and should be left unchanged.