Thoughts Off the Mic Wednesday 10/23/24
David Moulton David Moulton

Thoughts Off the Mic Wednesday 10/23/24

What Caught My Attention This Week

New Tactics to Jailbreak AI: The Risk of Camouflage and Distraction

Unit 42 revealed how attackers are bypassing large language model (LLM) safeguards with a technique called "Deceptive Delight." By embedding harmful content within harmless prompts, bad actors can trick AI into producing dangerous outputs. This highlights a growing vulnerability that demands stronger AI security measures.

Tricking CAPTCHAs: Lumma Stealer Malware on the Rise

Attackers are using Lumma Stealer malware to bypass CAPTCHAs, stealing sensitive data. As defenses weaken, organizations must strengthen their security.

Bumblebee Malware Returns

Bumblebee malware is back, more dangerous and harder to detect, underscoring the need for robust cyber defenses against ransomware.

Podcast Highlights

It was a busy week recording episodes of Threat Vector, featuring insightful conversations with Dr. Daniel Ford on cyber hygiene, Dr. May Wang on IoT security, and a dive into XDR with Allie Mellen from Forrester. Each guest brought fresh perspectives, making this week’s recordings especially thought-provoking.

Read More
The New Perimeter
David Moulton David Moulton

The New Perimeter

In a recent episode of Threat Vector, I spoke with Jamie Fitz-Gerald, Sr. Director of Product Management at Okta, about the crucial role of identity security in the hybrid work era. With employees accessing resources from various locations, identity has become the new perimeter, necessitating robust controls like multifactor authentication (MFA) and passwordless authentication. Jamie emphasized that identity is the cornerstone of a zero trust security strategy, where every user, device, and application is verified before access is granted. He also highlighted emerging trends like phishing-resistant authentication and identity proofing as vital tools in the fight against cyber threats. Tune in to the full interview to learn more about Jamie's insights and the future of identity security.

Read More
Insights into the Evolution of Cyber Conflict and Defense Strategies
David Moulton David Moulton

Insights into the Evolution of Cyber Conflict and Defense Strategies

In the latest episode of Threat Vector, I had the privilege of watching Michael Sikorski, CTO of Unit 42, and Jason Healey, Senior Research Scholar at Columbia University, dive deep into the evolution of cyber conflict and defense strategies. Their discussion highlighted the need for innovation and collaboration to outpace threat actors. Key takeaways include the importance of evolving defense tactics and using outcome-based metrics to measure success. This episode is a must-listen for cybersecurity leaders looking to make a real impact and secure our digital future.

Read More