Get the latest tech news

51 seconds to breach: How CISOs are countering AI-driven, lightning-fast deepfake, vishing and social engineering attacks


Attackers can breach a network in 51 seconds. CISOs fight back with zero-trust, AI-based threat detection & instant session token revocation.

North Korea’s FAMOUS CHOLLIMA adversary group is using generative AI to create fake LinkedIn profiles of IT job candidates with the goal of infiltrating global aerospace, defense, software and tech companies as remote employees. “We found a gap in our ability to revoke legitimate identity session tokens at the resource side,” Alex Philips, CIO at National Oilwell Varco (NOV), told VentureBeat in a recent interview. Time and again, VentureBeat sees security leaders who succeed in battling back against machine-speed attacks are those championing least privileged access, network and endpoint segmentation, monitoring every transaction and request for resources, and continually verifying identities.

Get the Android app

Or read this on Venture Beat

Read more on:

Photo of lightning

lightning

Photo of seconds

seconds

Photo of CISOs

CISOs

Related news:

News photo

Polycam’s new iPhone update lets you 3D scan rooms in seconds, stitch them together, edit with a team and automatically generate floorplan PDFs

News photo

The Champion Who Memorized 80 Numbers in 13.5 Seconds

News photo

Inspired by the humble bee, robotics researchers at MIT have designed insect-sized aerial bots with a reimagined wing system that can fly for up to 1,000 seconds | 100 times more than any similar bots we've seen in the past.