Malware - gettectonic.com
Artificial Intelligence (AI) is significantly transforming threat detection by enabling faster, more accurate identification of potential security breaches through its ability to analyze vast amounts of data in real-time, detect anomalies and patterns that might indicate a threat, even when those threats are new or previously unknown, thus providing a proactive approach to cybersecurity compared to traditional rule-based systems.

AI is Transforming Threat Detection

Artificial Intelligence (AI) is significantly transforming threat detection by enabling faster, more accurate identification of potential security breaches through its ability to analyze vast amounts of data in real-time, detect anomalies and patterns that might indicate a threat, even when those threats are new or previously unknown, thus providing a proactive approach to cybersecurity compared to traditional rule-based systems.

Read More
ChatGPT and Politics?

ChatGPT and Politics?

ChatGPT has also appeared in influence operations, with groups using it to generate political content for social media. OpenAI observed an Iranian-led operation, Storm-2035, using ChatGPT to publish politically charged content about U.S. elections and global conflicts. Yet, OpenAI noted that these AI-driven influence efforts often lack audience engagement.

Read More
Veeam Latest Acquisition

Veeam Latest Acquisition

Veeam continues its acquisition strategy with the purchase of Alcion, bolstering its capabilities in AI and as-a-service offerings. This acquisition follows Veeam’s investment in Microsoft 365 backup-as-a-service provider Alcion last year, and brings in a team of AI and security specialists. Analysts and Veeam executives see this move as a key step in expanding Veeam’s as-a-service offerings. Earlier this year, the company launched Veeam Data Cloud, a backup-as-a-service solution for Microsoft 365 and Azure workloads. “After years of resisting, Veeam has fully embraced the as-a-service model,” said Christophe Bertrand, an analyst at TheCube Research. Veeam Latest Acquisition The acquisition, which closed in mid-September, marks the second time Veeam has purchased a company founded by Niraj Tolia and Vaibhav Kamra. In 2020, Veeam acquired Kasten, their Kubernetes backup provider. A year ago, Veeam led a million funding round for Alcion, which has since developed AI-driven data protection solutions. Veeam has been active in acquisitions, joining a broader trend in the data protection market. Recently, Commvault acquired Clumio, Cohesity merged with Veritas, and Veeam itself bought Cirrus from CT4, which later became part of the Veeam Data Cloud. Earlier this year, Veeam also acquired Coveware, an incident response vendor. “Veeam hasn’t traditionally been an acquisition-heavy company, but that has changed in recent years,” said Rick Vanover, Veeam’s VP of product strategy. “I expect this trend to continue.” Alcion’s Role at Veeam This acquisition strengthens Veeam’s expertise in the fast-growing as-a-service market. Alcion’s team of fewer than 50 employees, including founders Niraj Tolia and Vaibhav Kamra, joins Veeam, with Tolia stepping in as Veeam’s new CTO. Tolia will lead product strategy and engineering for Veeam Data Cloud, succeeding Danny Allan, who recently became CTO at cybersecurity company Snyk. Alcion, which has hundreds of customers, will offer those customers the opportunity to transition to Veeam Data Cloud. However, Veeam has not finalized the future of Alcion’s product or established a timeline for its integration. “This acquisition brings incredible talent and thought leadership to Veeam, especially from Niraj and the Alcion team,” said Brandt Urban, Veeam’s senior VP of worldwide cloud sales. “Their expertise will help us rapidly enhance Veeam Data Cloud, adding more capabilities and expanding workload coverage.” Analysts, like Bertrand, expect Veeam to broaden its data protection offerings for additional SaaS platforms beyond Microsoft 365, looking toward collaboration and DevOps tools as potential areas for growth. AI and Security at the Forefront Alcion’s AI-powered features allow administrators to optimize backups, detect malware, and respond proactively to threats. According to Krista Case, an analyst at The Futurum Group, Alcion uses AI strategically to adapt backup schedules based on data modification patterns, trigger backups when potential threats are identified, and recommend the best recovery points. “When practitioners talk about cyber resilience, they’re focused on minimizing data loss and downtime—Alcion’s AI capabilities directly address these concerns,” said Case. Veeam has also been integrating AI into its existing products, offering inline malware detection and an Intelligent Diagnostics service. A forthcoming Copilot feature for Microsoft 365 backups will further enhance AI-driven data protection. Veeam Latest Acquisition “AI is a real asset when applied thoughtfully—it’s not just hype,” said Bertrand, adding that users are more interested in AI’s ability to drive outcomes, like detecting threats that could otherwise go unnoticed. Veeam executives echoed the importance of delivering clear, tangible AI benefits. “We keep user outcomes front and center because, otherwise, AI becomes an expensive experiment,” Vanover said. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
CISA Launches New Services Portal

CISA Launches New Services Portal

CISA Launches New Services Portal to Enhance Incident Reporting and Support In August, the Cybersecurity and Infrastructure Security Agency (CISA) introduced the CISA Services Portal, designed to streamline the process of reporting cybersecurity incidents and enhance information sharing. “The new CISA Services Portal improves the reporting process and offers more features for our voluntary reporters. We ask organizations reporting an incident to provide details such as the impacted entity, contact information, incident description, technical indicators, and mitigation steps,” a CISA spokesperson stated via email. By collecting detailed reports, CISA and its partners can assist victims in mitigating the effects of cyber incidents, prevent attackers from reusing tactics, and gain insights into the broader scope of adversary campaigns. This information-sharing benefits not just the initial victim but also helps protect other organizations from potential attacks. How the Portal Works The CISA Services Portal follows guidelines outlined in the NIST Special Publication 800-61 Revision 2, which defines a cyber incident as: In addition to cyber incidents, users can report malware, software vulnerabilities, threat indicators, and vulnerabilities in government websites. For reporting cyberattacks on critical infrastructure, users are directed to a different link as required by CIRCIA regulations. When using the portal, users are guided through a step-by-step reporting process, which includes identifying the affected organization, providing a detailed description of the incident, and outlining the technical details of the breach. What Makes CISA’s Portal Unique? While many breach reporting portals exist, CISA’s stands out for several reasons. It is a voluntary, stand-alone government portal available to all entities nationwide. It does not replace any breach reporting processes mandated by federal, state, local, or industry-specific regulations, such as those required by the FTC or FCC. The portal allows users to report incidents on behalf of their organization or as individual users. It also offers the option to set up an account for ongoing communication with CISA, where users can save, update, and share reports. What truly differentiates CISA’s portal is its capability to provide direct assistance in incident response and recovery. This is particularly valuable for small and medium-sized businesses that may lack the resources to effectively handle cyber incidents. Although reporting to CISA is not mandatory, the agency strongly encourages organizations to voluntarily report incidents or suspicious activity. CISA has also developed a guide to help prepare organizations for submitting reports, ensuring they have all necessary details related to the breach and their mitigation efforts. “Any organization experiencing a cyberattack or incident should report it—not only for their benefit but to help the broader community. CISA and our government partners have unique tools to assist with response and recovery, but we need to know about the incident to provide support,” said Jeff Greene, CISA Executive Assistant Director for Cybersecurity, in a statement announcing the portal. The new CISA Services Portal aims to strengthen collaboration, offering a more efficient and supportive environment for incident reporting and response. Salesforce comment: SAN FRANCISCO, Sept. 25, 2015—Salesforce (NYSE: CRM), the Customer Success Platform and world’s #1 CRM company, today issued the following statement on the proposed Cybersecurity Information Sharing Act of 2015 (“CISA”): “At Salesforce, trust is our number one value and nothing is more important to our company than the privacy of our customers’ data,” said Burke Norton, chief legal officer, Salesforce. “Contrary to reports, Salesforce does not support CISA and has never supported CISA.” Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
Acceptable AI Use Policies

Acceptable AI Use Policies

With great power comes—when it comes to generative AI—significant security and compliance risks. Discover how AI acceptable use policies can safeguard your organization while leveraging this transformative technology. AI has become integral across various industries, driving digital operations and organizational infrastructure. However, its widespread adoption brings substantial risks, particularly concerning cybersecurity. A crucial aspect of managing these risks and ensuring the security of sensitive data is implementing an AI acceptable use policy. This policy defines how an organization handles AI risks and sets guidelines for AI system usage. Why an AI Acceptable Use Policy Matters Generative AI systems and large language models are potent tools capable of processing and analyzing data at unprecedented speeds. Yet, this power comes with risks. The same features that enhance AI efficiency can be misused for malicious purposes, such as generating phishing content, creating malware, producing deepfakes, or automating cyberattacks. An AI acceptable use policy is essential for several reasons: Crafting an Effective AI Acceptable Use Policy An AI acceptable use policy should be tailored to your organization’s needs and context. Here’s a general guide for creating one: Essential Elements of an AI Acceptable Use Policy A robust AI acceptable use policy should include: An AI acceptable use policy is not just a document but a dynamic framework guiding safe and responsible AI use within an organization. By developing and enforcing this policy, organizations can harness AI’s power while mitigating its risks to cybersecurity and data integrity, balancing innovation with risk management as AI continues to evolve and integrate into our digital landscapes. Like Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more Top Ten Reasons Why Tectonic Loves the Cloud The Cloud is Good for Everyone – Why Tectonic loves the cloud You don’t need to worry about tracking licenses. Read more

Read More
AI in scams

AIs Role in Scams

How Generative AI is Supporting the Creation of Lures & Scams A Guide for Value Added Resellers Copyright © 2024 Gen Digital Inc. All rights reserved. Avast is part of Gen™. A long, long time ago, I worked for an antivirus company who has since been acquired by Avast.  Knowing many of the people involved in this area of artificial intelligence, I pay attention when they publish a white paper. AI in scams is something we all should be concerned about. I am excited to share it in our Tectonic Insights. Executive Summary The capabilities and global usage of both large language models (LLMs) and generative AI are rapidly increasing. While these tools offer significant benefits to the general public and businesses, they also pose potential risks for misuse by malicious actors, including the misuse of tools like OpenAI’s ChatGPT and other GPTs. This document explores how the ChatGPT brand is exploited for lures, scams, and other social engineering threats. Generative AI is expected to play a crucial role in the cyber threat world challenges, particularly in creating highly believable, multilingual texts for phishing and scams. These advancements provide more opportunities for sophisticated social engineering by even less sophisticated scammers than ever before. Conversely, we believe generative AI will not drastically change the landscape of malware generation in the near term. Despite numerous proofs of concept, the complexity of generative AI methods still makes traditional, simpler methods more practical for malware creation. In short, the good may not outweigh the bad – just yet. Recognizing the value of generative AI for legitimate purposes is important. AI-based security and assistant tools with various levels of maturity and specialization are already emerging in the market. As these tools evolve and become more widely available, substantial improvements in their capabilities are anticipated. AI-Generated Lures and Scams AI-generated lures and scams are increasingly prevalent. Cybercriminals use AI to create lures and conduct phishing attempts and scams through various texts—emails, social media content, e-shop reviews, SMS scams, and more. AI improves the credibility of social scams by producing trustworthy, authentic texts, eliminating traditional phishing red flags like broken language and awkward addressing. These advanced threats have exploited societal issues and initiatives, including cryptocurrencies, Covid-19, and the war in Ukraine. The popularity of ChatGPT among hackers stems more from its widespread recognition than its AI capabilities, making it a prime target for investigation by attackers. How is Generative AI Supporting the Creation of Lures and Scams? Generative AI, particularly ChatGPT, enhances the language used in scams, enabling cybercriminals to create more advanced texts than they could otherwise. AI can correct grammatical errors, provide multilingual content, and generate multiple text variations to improve believability. For sophisticated phishing attacks, attackers must integrate the AI-generated text into credible templates. They can purchase functional, well-designed phishing kits or use web archiving tools to replicate legitimate websites, altering URLs to phish victims. Currently, attackers need to manually build some aspects of their attempts. ChatGPT is not yet an “out-of-the-box” solution for advanced malware creation. However, the emergence of multi-type models, combining outputs like images, audio, and video, will enhance the capabilities of generative AI for creating believable phishing and scam campaigns. Malvertising Malvertising, or “malicious advertising,” involves disseminating malware through online ads. Cybercriminals exploit the widespread reach and interactive nature of digital ads to distribute harmful content. Instances have been observed where ChatGPT’s name is used in malicious vectors on platforms like Facebook, leading users to fraudulent investment portals. Users who provide personal information become vulnerable to identity theft, financial fraud, account takeovers, and further scams. The collected data is often sold on the dark web, contributing to the broader cybercrime ecosystem. Recognizing and mitigating these deceptive tactics is crucial. YouTube Scams YouTube, one of the world’s most popular platforms, is not immune to cybercrime. Fake videos featuring prominent figures are used to trick users into harmful actions. This strategy, known as the “Appeal to Authority,” exploits trust and credibility to phish personal details or coerce victims into sending money. For example, videos featuring Elon Musk discussing OpenAI have been modified to scam victims. A QR code displayed in the video redirects users to a scam page, often a cryptocurrency scam or phishing attempt. As AI models like Midjourney and DALL-E mature, the use of fake images, videos, and audio is expected to increase, enhancing the credibility of these scams. Typosquatting Typosquatting involves minor changes in URLs to redirect users to different websites, potentially leading to phishing attacks or the installation of malicious applications. An example is an Android app named “Open Chat GBT: AI Chat Bot,” where a subtle URL alteration can deceive users into downloading harmful software. Browser Extensions The popularity of ChatGPT has led to the emergence of numerous browser extensions. While many are legitimate, others are malicious, designed to lure victims. Attackers create extensions with names resembling ChatGPT to deceive users into downloading harmful software, such as adware or spyware. These extensions can also subscribe users to services that periodically charge fees, known as fleeceware. For instance, a malicious extension mimicking “ChatGPT for Google” was reported by Guardio. This extension stole Facebook sessions and cookies but was removed from the Chrome Web Store after being reported. Installers and Cracks Malicious installers often mimic legitimate tools, tricking users into installing malware. These installers promise to install ChatGPT but instead deploy malware like NodeStealer, which steals passwords and browser cookies. Cracked or unofficial software versions pose similar risks, hiding malware that can steal personal information or take control of computers. This particular method of installing malware has been around for decades. However the usage of ChatGPT and other free to download tools has given it a resurrection. Fake Updates Fake updates are a common tactic where users are prompted to update their browser to access content. Campaigns like SocGholish use ChatGPT-related articles to lure users into downloading remote access trojans (RATs), giving attackers control over infected devices. These pages are often hosted on vulnerable WordPress sites or sites with

Read More
AI Misconceptions Dispelled

AI Misconceptions Dispelled

The recent launch of GPT-4o (“o” for “omni”) has captivated everyone with its seamless human-computer interaction. Capable of solving math problems, translating languages in real-time, and even answering queries in a human voice with emotions, GPT-4o is a game-changer. Within hours of its debut, shares of Duolingo, the popular language EdTech platform, plummeted by 26% as investors perceived GPT-4o as a potential threat. But what AI Misconceptions Dispelled, would prevent this? Fears about AI are widespread. Many believe it will become so advanced and efficient that employing humans will be too costly, potentially leading to mass unemployment. Over the past year, it has become clear that artificial intelligence (AI) is among the most disruptive forces in business. AI promises efficiency and speed but also raises concerns about bias and ethics. In a candid conversation on Mint’s new video series All About AI, Arundhati Bhattacharya, Chairperson and CEO of Salesforce India, dispels these fears and discusses bridging the generation gap and making Salesforce a Great Place to Work. Forging Unity and Vision “When I came in, there were disparate groups—sales and distribution, technology and products, support and success. Each group had its leaders, but nobody was bringing them together to create one Salesforce vision and ensure that each group developed the Salesforce DNA,” Arundhati reflects on her April 2020 arrival. She underscored Salesforce’s values-driven approach, highlighting the significance of Trust, Customer Success, Innovation, Equality, and Sustainability. Under Arundhati’s leadership, Salesforce India has risen from 36th to 4th on the Great Places to Work list. Navigating AI Skepticism AI advancements are profoundly shaping industries and humanity’s future. According to Frost & Sullivan’s “Global State of AI, 2022” report, 87% of organizations see AI and machine learning as catalysts for revenue growth, operational efficiency, and better customer experiences. A 2023 IBM survey found that 42% of large businesses have integrated AI, with another 40% considering it. Furthermore, 38% of organizations have adopted generative AI, with an additional 42% contemplating its implementation. Despite the excitement around AI, skepticism remains. Arundhati offers insights on addressing this skepticism and using AI to benefit society. She suggests a balanced approach, noting that every significant technological change has sparked similar fears. Arundhati argues that AI won’t necessarily lead to massive unemployment, given humanity’s ability to adapt and evolve. Amidst India’s socio-economic challenges, Arundhati sees AI as a potent tool for positive change. She cites examples like the Prime Minister’s Jan Dhan Yojana, where AI-enabled solutions facilitated broader financial inclusion. “Similarly, AI can greatly improve services in state hospitals where doctors are overworked. AI can gather patient symptoms and present an initial diagnosis, allowing doctors to focus on more critical aspects. The technology is also being used to check sales conversations for accuracy in insurance, ensuring compliance and reducing mis-selling,” she elaborates. Driving Productivity through AI Integration Improving productivity in India is a pressing issue, and AI can effectively bridge this gap. However, the term “AI” is often overused and misunderstood. People need to approach AI initiatives with intentionality and focus. First, determine the use cases for AI, such as improving productivity, gaining customer mindshare, or enhancing customer experience. Once that is clear, ensure your organization is structured to provide the right inputs for AI, which involves having a robust data strategy. Tools like Data Cloud can help by integrating various data sources without copying the data and extracting intelligence from them. Lastly, securing buy-in from employees is crucial for successful AI implementation. Addressing their concerns, communicating the potential risks, and aligning everyone toward the same goal is essential. Securing the Future: Addressing AI Security Concerns As AI technologies advance, concerns about their security and potential misuse also rise. Threat actors can exploit sophisticated AI tools intended for positive purposes to carry out scams and fraud. As businesses rely more on AI, it is vital to recognize and protect against these security risks. These risks include data manipulation, automated malware, and abuse through impersonation and hallucination. To tackle AI security challenges, consider prioritizing cybersecurity measures for AI systems. Salesforce makes substantial investments in cybersecurity daily to stay ahead of potential threats. “We use third-party infrastructure with additional security layers on top. Public cloud infrastructure provides multiple layers of security, much like a compound with perimeter, building, and apartment security,” Arundhati explains. Empowering the Next Generation Workforce and Fostering Innovation Transitioning from her previous role as Chairperson of the State Bank of India to leading Salesforce India, Arundhati acknowledges the generational shift in workforce dynamics. She emphasizes understanding and catering to the evolving needs and aspirations of a younger workforce, focusing on engagement and fulfillment beyond monetary incentives. “Salesforce has a strong giving policy called one by one by one, where we give 1% of our profit, products, and time to the nonprofit sector. This resonates with the younger workforce, making them feel engaged and fulfilled.” Through a dedicated startup program, Salesforce fosters a collaborative ecosystem where startups can leverage resources, tools, and connections to thrive and succeed. Arundhati’s stewardship of Salesforce India epitomizes a transformative leadership approach anchored in values, innovation, and community empowerment. Under her leadership, Salesforce India continues to chart a course toward sustainable growth and inclusive prosperity, poised to redefine the paradigm of corporate success in the digital age. Like1 Related Posts Salesforce OEM AppExchange Expanding its reach beyond CRM, Salesforce.com has launched a new service called AppExchange OEM Edition, aimed at non-CRM service providers. Read more The Salesforce Story In Marc Benioff’s own words How did salesforce.com grow from a start up in a rented apartment into the world’s Read more Salesforce Jigsaw Salesforce.com, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more Health Cloud Brings Healthcare Transformation Following swiftly after last week’s successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Read More
gettectonic.com