Issue 21: AI-Driven Credential Threats

Issue 21: AI-Driven Credential Threats

The hacker group Scattered Spider is back in action and has launched a new campaign. You might remember them from when they hit the news last year. They were the group behind the notorious attacks on MGM Resorts International and Caesars Entertainment in Las Vegas, Nevada. This time, their focus is on critical organizations within the financial and healthcare industries. Since April 20th, 29 companies have been targeted, many of which are major banks and insurance companies. While this is not the first time finance and healthcare industries have been a target, it illustrates an unsettling rise in these sophisticated cyber threats.

Scattered Spider threat actors leverage third-party software to facilitate lateral movement and maintain persistence on a target organization's network.” ~ CISA, Joint Cybersecurity Advisory

As these attackers evolve, they're not just a threat to casinos but now to the backbone of our critical infrastructure. Their tactics? Elaborate social engineering, assisted by AI, designed to steal credentials. Once this happens, they don’t have to hack; they log in.

IBM X-Force Threat Intelligence Index 2024

Last month, Veritas unveiled a series of new capabilities designed to combat these ever-evolving cyber threats. Our new AI-powered product solutions include:

Veritas also announced new cyber resiliency assessment, recovery services, and new security ecosystem partners. These solutions ensure you are prepared to be resilient in the face of an attack and set up with tools that proactively prevent attacks.

If you missed our most recent announcement, check out the full broadcast on-demand: Achieving Cyber Resilience with Zero Doubt. Hai Nguyen and Tim Burlowski introduced new Veritas product capabilities that put the power of AI in your hands to help you adapt to the latest wave of stolen credential attacks.


The Vision Behind Veritas Alta™ Copilot

Watch Varun Grover and Simon Jelley discuss the transformative power of Veritas Alta Copilot. From managing data volume to automating backup and recovery, they address critical challenges with AI solutions.

Access our YouTube playlist for more insights.


Simplify Data Management with Veritas Alta Copilot

Learn how the new Veritas Alta Copilot Generative AI assistant enhances data management and visualization. Simon Jelley, VP & GM of Product Management provides all the benefits of this innovative feature that makes the Veritas Alta View experience more intuitive and accessible for all users. https://vrt.as/4bcZcQk


Prioritizing Foundational Cyber Resiliency

Ready to take action? Are your people, processes and technology all linked together in a systematic way?

Corporations today are, "completely centralizing backup and recovery teams with business continuity and security teams because its just so critical that they have a joined up plan."

Watch The Futurum Group’s Shira Rubinoff interview Veritas Global Lead Cyber Resilience and Data Protection Strategy, Tim Burlowski, as he shares what organizations must do to adapt in today's cyberthreat landscape.


Veritas L!VE: Speeding Up Cyber Response with Analytics

Did you catch the latest episode of Veritas L!VE? Catch the replay as Demetrius Malbrough dives deep into the world of cybersecurity with Mark Stevens, Securonix. Discover how advanced analytics and behavior tracking are revolutionizing data management systems to enhance cybersecurity. Learn how you can combat threats and secure your data effectively.


Don't Delay. Update Today.

Should you rely on Patch Tuesday or adopt a continuous patching strategy? Global Field CISO, Joye Purser CISSP PhD explores the importance of proactive patching practices for enhanced cybersecurity resilience. Stay ahead of vulnerabilities and protect your systems effectively. https://vrt.as/3WOXpgu


Small Business Currents

Simon Jelley dispels the myth that only large organizations are ransomware targets.

InformationWeek

How Does the Ransomware-as-a-Service Model Work? In a recent InformationWeek article, Veritas Field CISO Joye Purser CISSP PhD shares insight into the RaaS economy and the collaboration needed to disrupt RaaS groups.

SDxCentral

Did you know more than two-thirds of non-IT employees are over-confident in their ability to detect a phishing email that could lead to a ransomware attack? Dive into our latest report with insights from Matt Waxman.


How to Recover the Business from a Ransomware Attack in Minutes

Isolated Recovery technology implemented by Veritas as part of NetBackup and Flex Scale to help customers recover in minutes instead of days. Learn more: https://vrt.as/4dNPKFn


Empower your team with the Cyber Recovery Checklist

Remove doubt and fortify your defenses with a robust Cyber Recovery Checklist. Demetrius Malbrough dives into the essential strategies for safeguarding your organization against cyber threats in his latest blog post. https://vrt.as/43TSYm6


Resources

To view or add a comment, sign in

Explore topics