Learn
DeepSeas Monthly Cyber Threat Intel Rollup – September 2024
Stay ahead of cyber threats with DeepSeas' Monthly Cyber Threat Intel Rollup.
The DeepSeas AI Security Model
The meteoric rise of AI, particularly large language models (LLMs) like ChatGPT, has been nothing short of revolutionary. These technologies have redefined how we create content, interact with software, and even how businesses operate. For instance, it took ChatGPT a mere five days to amass a million users, a feat that took other groundbreaking platforms like Netflix and Twitter years to achieve. This rapid adoption underscores the transformative power of AI, but it also presents significant challenges, particularly for cybersecurity professionals.
Vulnerability Assessment vs. Penetration Test
There are key differences between a vulnerability assessment and penetration testing. Does your team use these terms interchangeably?
DeepSeas Monthly Cyber Threat Intel Rollup – August 2024
Stay ahead of cyber threats with DeepSeas' Monthly Cyber Threat Intel Rollup.
Need a vCISO or Deputy CISO? Ask Yourself These Questions.
Are you ready to transform your cybersecurity program but don't have the budget to expand your in-house team? Use the list of questions below to determine if you could benefit from a DeepSeas virtual CISO (vCISO) or Deputy CISO.
Possible Trigona Ransomware Appearance
A web server with RDP access had been brute forced by an actor who the DeepSeas cyber threat intelligence crew believes may have been trying to deliver and execute Trigona ransomware. The intruder performed many different malicious actions in the client’s environment after gaining initial access; establishing persistence, escalating privileges, evading defenses, performing asset discovery, conducting lateral movement, data collection, and more. Upon review of the intruder’s activities DeepSeas noted that some of the tactics, techniques, and procedures (TTPs) matched previously observed TTPs associated with the actor responsible for the Trigona ransomware.
Threat Actors Targeting Edge Devices – Edge Device Security
DeepSeas cyber defenders are seeing reports of increased attacks by threat actors against edge devices. There are several ways criminals have targeted edge devices, and organizations reporting incidents related to third parties.
Emerging AI Risk: AI Becoming (Unintended) Vulnerability Scanner
With the rise of artificial intelligence (AI) and machine learning (ML), we're entering a new frontier where the tools designed to help us could inadvertently create new vulnerabilities. A recent observation by the SANS Internet Storm Center highlights this emerging risk in a way that should prompt us all to pause and reflect.
The AI Risks Every Executive Leader Should be Managing
Artificial Intelligence (AI) is being strategically integrated into many organizations with the promise of numerous benefits and opportunities. However, it is crucial to recognize and address the potential risks associated with leveraging any technology, including AI. The list below highlights various risks leadership should be managing.
Financial Institution Facing Cyber Attacks Turns to DeepSeas for Persistent Defense
Learn more about how a finance organization facing escalating cyber attacks turned to DeepSeas for a robust, multi-layered defense strategy.
Hidden Risk Caused by Your SOC’s Alert Prioritization
Staying ahead of ever-evolving threats requires expertise & guidance. Use this checklist as a guide in your evaluation when hiring a CISO.
Join our Team
21% of the DeepSeas crew are Veterans or Active Military Reservists. Join our talented crew of cyber experts.