Tag Archive for: Training

Become a Cyber Virtuoso: Master the Art of Defense with Lumify Work’s Advanced Digital Security Training for Tomorrow’s Defenders


Image By Freepik

Introduction

In the ever-evolving landscape of digital threats, the need for adept cybersecurity professionals has never been more critical. As cyber adversaries continue to grow in sophistication, mastering the art of defense becomes paramount for safeguarding digital landscapes. In this article, we embark on a journey into the realm of Lumify Work’s Advanced Digital Security Training, exploring how it equips aspiring defenders to navigate the complex challenges of tomorrow’s cybersecurity landscape.

The Digital Battlefield: Understanding the Stakes

Before delving into the intricacies of Lumify Work’s cyber security training, it’s crucial to grasp the high-stakes nature of the digital battlefield. Cyber threats have transcended mere nuisances; they now pose existential risks to businesses, governments, and individuals alike. As technology advances, so do the techniques of malicious actors seeking to exploit vulnerabilities for financial gain, data breaches, or even acts of cyber warfare.

Lumify Work’s Pioneering Approach to Cybersecurity Training

Comprehensive Curriculum Designed for Tomorrow’s Threats

Lumify Work’s Advanced Digital Security Training adopts a forward-thinking approach, ensuring that participants are equipped to face emerging threats head-on. The curriculum goes beyond the basics, immersing learners in real-world scenarios that mirror the complexity of modern cyber threats.

Hands-On Labs and Simulations

The program places a strong emphasis on practical experience. Participants engage in hands-on labs and simulations that replicate actual cyber-attack scenarios. This immersive learning approach not only reinforces theoretical knowledge but also hones the practical skills necessary to combat evolving threats effectively.

 Expert-Led Instruction

Led by industry experts with a wealth of experience, Lumify Work’s training provides invaluable insights into the latest cybersecurity trends, tactics, and best practices. Learners benefit from the wisdom of seasoned professionals who have navigated the front lines of cyber defense.

Continuous Updates to Stay Ahead

The digital landscape…

Source…

Commonwealth training on internet safety praised by Papua New Guinea judges


Judges in Papua New Guinea have commended a new Commonwealth training course aimed at upskilling them to handle cybercrime cases and make the internet safer for their citizens.

Supported by the United Kingdom, the Commonwealth Secretariat partnered with the Papua New Guinea Centre for Judicial Excellence to organise the training in the capital city, Port Moresby on 12 and 13 February 2023.

More than 40 judges and magistrates attended the training, engaging in simulations to deepen their understanding of cyber threats and computer-based offences.

They were equipped with practical skills to apply internationally recognised good practices within their jurisdictions, gather electronic evidence admissible in courts, and foster cross-border cooperation to prosecute cybercrimes.

Covering topics ranging from protecting user data to authenticating digital evidence, the training course aimed to address the challenges judicial officers often face in tackling cybercrimes, particularly in developing countries.

A growing problem

During the opening session, Justice Les Gavara-Nanu, a Supreme Court judge, commended the timely training and drew attention to the changing landscape of Papua New Guinea’s criminal justice system.

He underscored the challenge posed by the surge in cybercrime, which requires new approaches to evidence-gathering compared to traditional crimes.

Justice Gavara-Nanu continued:

“We need assistance from the Commonwealth Secretariat to deal with these types of cases, from investigation [and] detection to prosecution and adjudication which is what concerns judges and magistrates as adjudicators.”

John Carey, Judge Administrator of the Papua New Guinea Centre for Judicial Excellence, echoed Justice Gavara-Nanu’s sentiments, expressing full support for the training on behalf of the country’s Chief Justice, Sir Gibuna Gibbs Salika KBE.

Financial implications

Reports indicate a disproportionate increase in cybercrimes in the Asia-Pacific region, accounting for 31 per cent of all incidents remediated around the world in 2023.

Cybersecurity threats were estimated to cost organisations in the Asia-Pacific region about US $1.75…

Source…

Simple Hacking Technique Can Extract ChatGPT Training Data


Can getting ChatGPT to repeat the same word over and over again cause it to regurgitate large amounts of its training data, including personally identifiable information and other data scraped from the Web?

The answer is an emphatic yes, according to a team of researchers at Google DeepMind, Cornell University, and four other universities who tested the hugely popular generative AI chatbot’s susceptibility to leaking data when prompted in a specific way.

‘Poem’ as a Trigger Word

In a report this week, the researchers described how they got ChatGPT to spew out memorized portions of its training data merely by prompting it to repeat words like “poem,” “company,” “send,” “make,” and “part” forever.

For example, when the researchers prompted ChatGPT to repeat the word “poem” forever, the chatbot initially responded by repeating the word as instructed. But after a few hundred times, ChatGPT began generating “often nonsensical” output, a small fraction of which included memorized training data such as an individual’s email signature and personal contact information.

The researchers discovered that some words were better at getting the generative AI model to spill memorized data than others. For instance, prompting the chatbot to repeat the word “company” caused it to emit training data 164 times more often than other words, such as “know.”

Data that the researchers were able to extract from ChatGPT in this manner included personally identifiable information on dozens of individuals; explicit content (when the researchers used an NSFW word as a prompt); verbatim paragraphs from books and poems (when the prompts contained the word “book” or “poem”); and URLs, unique user identifiers, bitcoin addresses, and programming code.

A Potentially Big Privacy Issue?

“Using only $200 USD worth of queries to ChatGPT (gpt-3.5-turbo), we are able to extract over 10,000 unique verbatim memorized training examples,” the researchers wrote in their paper titled “Scalable Extraction of Training Data from (Production) Language Models.”

“Our extrapolation to larger budgets suggests that dedicated adversaries could extract far more data,” they wrote. The researchers estimated an adversary could extract 10 times more…

Source…

Security awareness training among govt workers needed • BusinessMirror Editorial


Hacking incidents have affected many big companies and government agencies in recent years, including a 2018 Facebook data breach that enabled attackers to access millions of user data. That year, it was discovered that political consulting firm Cambridge Analytica had obtained access to the personal information of millions of Facebook users without their consent. This was made possible by access control vulnerability in the social media’s application programming interface (API) that allowed third-party developers to access user data.

The scandal brought to light the issue of data privacy and the need for stricter access control measures. Facebook faced widespread criticism for mishandling users’ personal information and was fined $5 billion by the US Federal Trade Commission for violating users’ privacy.

No one knows the number of hackers around the world since many of those with malicious intentions are unidentified. However, some hackers join the ethical hacking community. Based on the 2018 Hacker Report, there are more than 166,000 registered ethical hackers worldwide.

India and the United States were the top countries where hackers were located, with 43 percent combined representatives. Russia, Pakistan, and the United Kingdom follow, with 14 percent combined representatives, according to the HackerOne hacker community.

CrowdStrike, the company that discovered that the Russians had hacked the Democratic National Committee, said that Russian hackers are known to be the fastest hackers. They can access a computer network in just 18 minutes, while Korean hackers gain access in two and a half hours, and Chinese hackers need four hours.

In the Philippines, a recent hacking incident stole personally identifiable information (PII) of Philippine Health Insurance Corp. members and its employees. PhilHealth was hacked by the Medusa group, and the hackers were demanding a $300-million ransom in exchange for the deletion of the stolen PhilHealth files posted on the dark web. PhilHealth President and CEO Emmanuel Ledesma Jr. said the insurer will not pay the ransom, but it had to spend P172 million to buttress its cyber defense.

This is the “unfortunate…

Source…