<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber in 60 - Jazz Solutions, Inc. (JSL)</title>
	<atom:link href="https://www.jazzsolutions.com/category/cyber-in-60/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.jazzsolutions.com</link>
	<description>Cybersecurity, ICAM, Government IT</description>
	<lastBuildDate>Wed, 22 Oct 2025 17:50:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.jazzsolutions.com/wp-content/uploads/2023/04/cropped-JSL-updated-favicon-1-150x150.webp</url>
	<title>Cyber in 60 - Jazz Solutions, Inc. (JSL)</title>
	<link>https://www.jazzsolutions.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Your first pet&#8217;s name is not a secret to hackers</title>
		<link>https://www.jazzsolutions.com/your-first-pets-name-is-not-a-secret-to-hackers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=your-first-pets-name-is-not-a-secret-to-hackers</link>
		
		<dc:creator><![CDATA[Avery Moore]]></dc:creator>
		<pubDate>Wed, 22 Oct 2025 17:42:52 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14889</guid>

					<description><![CDATA[<p>I have&#160;written&#160;articles about password management. I have told an uncountable number of people about password management.&#160;The advice that you should&#160;create&#160;unique and strong passwords for every single&#160;service you&#160;use is still relevant and sound.&#160;In fact, you&#160;don’t&#160;need to search the internet&#160;very hard&#160;to find [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/your-first-pets-name-is-not-a-secret-to-hackers/">Your first pet’s name is not a secret to hackers</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14889" class="elementor elementor-14889" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-77ea5da elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="77ea5da" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-932fbe5" data-id="932fbe5" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3f1e51a elementor-widget elementor-widget-text-editor" data-id="3f1e51a" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>I have&nbsp;written&nbsp;articles about password management. I have told an uncountable number of people about password management.&nbsp;The advice that you should&nbsp;create&nbsp;unique and strong passwords for every single&nbsp;service you&nbsp;use is still relevant and sound.&nbsp;In fact, you&nbsp;don’t&nbsp;need to search the internet&nbsp;very hard&nbsp;to find instances of accounts being taken over because someone used their “old reliable” password on most of their accounts. This is&nbsp;a&nbsp;fundamental&nbsp;personal cybersecurity&nbsp;practice.&nbsp;I’ll&nbsp;say it louder for the people in the back. Use strong and unique passwords for every single online service you use.&nbsp; Zero exceptions.<span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">But&nbsp;there’s&nbsp;one&nbsp;aspect of account security that&nbsp;isn’t&nbsp;discussed often or as widely: your security questions.&nbsp;We’re&nbsp;told that we should “limit sharing” on social media. Isn’t&nbsp;the point of social&nbsp;media&nbsp;to share?&nbsp;We’d&nbsp;better not reveal our favorite food or our first car or the city where we were married because, you know, security. And this is one of the fundamental weaknesses&nbsp;of security questions.&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">Security questions rely on the fact that 1)&nbsp;you’re&nbsp;going to forget your password; and 2) there are fundamental things about yourself or your past that are immutable. But what&nbsp;they are&nbsp;really intended to do is cut down on calls to the support desk. You forgot your password? No problem!&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></p>
<ul>
<li><span data-contrast="auto"> Question:What’s&nbsp;the name of your first pet?</span><span data-ccp-props="{}">&nbsp;</span></li>
<li><span data-contrast="auto"> Answer:Fuzzy Britches</span><span data-ccp-props="{}">&nbsp;</span></li>
</ul>
<p><span data-contrast="auto">Welcome&nbsp;back!!&nbsp;No&nbsp;need to call the support desk now.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">There are at least two&nbsp;points of ponderance I have&nbsp;about these so-called security questions:</span><span data-ccp-props="{}">&nbsp;</span></p>
<ol>
<li><span data-contrast="auto"> Where and how do online&nbsp;services store and protect the answers to your&nbsp;security&nbsp;questions?</span><span data-ccp-props="{}">&nbsp;</span></li>
<li><span data-contrast="auto"> When (not if) a data breach happens to one of those services, are the answers to your security questions included in the breached data (along with your personal data and password)?</span></li>
</ol>
<p><span data-contrast="auto">The answer to the first question is: I&nbsp;don’t&nbsp;know,&nbsp;and it&nbsp;probably varies&nbsp;widely&nbsp;across&nbsp;sites&nbsp;and services.&nbsp;The name of your first girl/boyfriend is&nbsp;probably stored&nbsp;in plain text.&nbsp;</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">The answer to the second question is: It is&nbsp;probably part&nbsp;of the criminal data haul.&nbsp;As a result,&nbsp;the bad guys&nbsp;now&nbsp;know that your&nbsp;childhood nickname was “Poochy”.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">There’s&nbsp;really nothing&nbsp;you can do&nbsp;about how online services manage your security questions. But there is something you can do&nbsp;on&nbsp;your end.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">If you can, avoid answering security questions in the first place. That information is yours to share or not&nbsp;in accordance with&nbsp;your own tolerance for privacy about&nbsp;the name of your&nbsp;first-grade&nbsp;teacher or your favorite food. However, in most cases, sites and services that use security questions do not let you&nbsp;proceed&nbsp;without answering them.&nbsp;The best counsel I can give is to treat the answers to your security questions as you would any other authenticator. In other words, treat it just like a password.&nbsp;Both passwords&nbsp;and security question answers&nbsp;should only be known to you.&nbsp;Both passwords&nbsp;and&nbsp;security question answers&nbsp;should be long and&nbsp;strong&nbsp;and—you guessed it—unique for every single&nbsp;site or&nbsp;service.&nbsp;Here’s&nbsp;an example.&nbsp;I’m&nbsp;going to go ahead and let you know what my favorite flavor of ice cream is. Here it is:&nbsp;7vri;1&amp;Nu_&amp;% 0Dvx%Y4ETV$&nbsp;There’s&nbsp;just nothing more delicious than a big bowl of 7vri;1&amp;Nu_&amp;% 0Dvx%Y4ETV$ ice cream!!</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">Don’t&nbsp;worry,&nbsp;that’s&nbsp;not the answer I really use, but you get the idea. You should be treating this authentication information just like a password.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">Now you may be thinking to yourself that you&nbsp;can’t&nbsp;possibly memorize&nbsp;that and then be able to reproduce it if you “forget your password”.&nbsp;That’s&nbsp;where password managers come in. Use&nbsp;a password manager to create&nbsp;a&nbsp;strong and&nbsp;unique password for&nbsp;each and every&nbsp;site. And, when the security questions appear, use the notes feature&nbsp;in&nbsp;that same&nbsp;password&nbsp;entry&nbsp;in your password manager&nbsp;to record the security questions that you used&nbsp;along with the strong and&nbsp;unique answers to the security questions.&nbsp;Here’s&nbsp;an example of&nbsp;what I do.</span><span data-ccp-props="{}">&nbsp;</span></p>
<ul>
<li><span data-contrast="auto"> Username: UsernameExample</span><span data-ccp-props="{}">&nbsp;</span></li>
<li><span data-contrast="auto"> Password: I2OB1FP(U}`WN4WX!H)!K+lW=O9omns&lt;</span></li>
<li><span data-contrast="auto"> Security Questions:</span></li>
<li><span data-contrast="auto"> Q1: What was&nbsp;the name of your fifth grade PE teacher?</span><span data-ccp-props="{}">&nbsp;</span></li>
<li><span data-contrast="auto"> A1:!.Z^La&amp;Me3Mc5nx2s-o3$&#8217;Z7a</span><span data-ccp-props="{}">&nbsp;</span></li>
<li><span data-contrast="auto"> Q2: What was the first concert you attended?</span><span data-ccp-props="{}">&nbsp;</span></li>
<li><span data-contrast="auto"> A2:rbGm&#8217;rYrgFpV&amp;ga-nYz$=L~i</span><span data-ccp-props="{}">&nbsp;</span></li>
</ul>
<p><span data-contrast="auto">When you set yours up, be sure to use something different than what I used above&nbsp;and use a different answer every single time, even for the exact same question. Many password managers provide password creation&nbsp;tools,&nbsp;and there are websites that will generate random strings of characters that you can&nbsp;use for&nbsp;both your passwords and the answers to your security questions.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">If you use a password manager for all of your accounts, the chances are good that you’ll never need to invoke the use of the security questions at all, because you’ll be able to&nbsp;easily&nbsp;access the password.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">Of course, this is not a “silver bullet” solution, but it does prevent bad guys from easily getting into your account by simply knowing that your first car was a 1979 Ford Fairmont.&nbsp;Becoming a harder target is not difficult, but it does require a little bit of diligence.</span><span data-ccp-props="{}">&nbsp;</span></p>
<p><span data-contrast="auto">&nbsp;</span></p>
<p></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/your-first-pets-name-is-not-a-secret-to-hackers/">Your first pet’s name is not a secret to hackers</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8216;Old news&#8217; data breaches can still cost you</title>
		<link>https://www.jazzsolutions.com/old-news-data-breaches-can-still-cost-you/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=old-news-data-breaches-can-still-cost-you</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Wed, 22 Oct 2025 13:27:35 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14877</guid>

					<description><![CDATA[<p>Just the other morning, while catching the news over coffee, one of our team members almost changed the channel when a story came on about the National Public Data breach of 2024. After all, that breach happened months ago — [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/old-news-data-breaches-can-still-cost-you/">‘Old news’ data breaches can still cost you</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14877" class="elementor elementor-14877" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-bcbc4ae elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bcbc4ae" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43006fe" data-id="43006fe" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-cbfe90a elementor-widget elementor-widget-text-editor" data-id="cbfe90a" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Just the other morning, while catching the news over coffee, one of our team members almost changed the channel when a story came on about the National Public Data breach of 2024. After all, that breach happened months ago — old news, right?</p><p>It wasn’t.</p><p>The report revealed that this major data breach exposed the personally identifiable information (PII) of nearly 170 million people — about half of the U.S. population. That information, once stolen, didn’t just vanish. It continues to circulate on the dark web and, more worryingly, has surfaced on public sites accessible through a simple Google search.</p><p>The exposed data included:</p><ul><li>Full names</li><li>Dates of birth</li><li>Addresses (current and historic)</li><li>Social Security numbers</li><li>Phone numbers</li><li>Names of relatives</li><li>Email addresses</li></ul><p>That realization led to a sobering thought: what could someone do with that much personal information? A little research made it clear. PII from breaches like this is often used for:</p><ul><li>Identity theft and new-account fraud – opening credit cards, loans, or bank accounts in someone else’s name.</li><li>Phishing and smishing – using detailed personal data to make fake messages more convincing.</li><li>Authentication bypass and account takeover – leveraging addresses or family names that people often use for passwords or security-question answers.</li></ul><p>Curious — and concerned — our staffer searched their own name online and discovered their personal data posted on several sites. The assumption had always been that if a company was breached, affected individuals would be notified. But as this case shows, that’s not always true.</p><p>So, what can individuals do to protect themselves? Here are the steps JSL recommends:</p><ul><li>Search your name to see what’s publicly available.</li><li>Request removal from Google search results. Click the three vertical dots next to a result, choose <em>Remove result,</em>and follow Google’s instructions.</li><li>Contact websites directly to request deletion of your data. Each site’s process differs — search for “how to remove my information from [site name].”</li><li>Run a privacy scan, such as the <a href="https://www.experian.com/protection/personal-privacy-scan/">Experian Personal Privacy Scan</a>.</li><li>Place a fraud alert with major credit bureaus if your data was exposed:<ul><li>TransUnion fraud alerts</li><li>Equifax fraud alerts</li><li>Experian fraud alerts</li></ul></li></ul><p>Removing personal data can take time, but the effort is worthwhile. Consumer privacy-removal services can also assist if manual steps feel overwhelming.</p><p>What seemed like “old news” turned out to be a wake-up call. The National Public Data breach of 2024 isn’t just a headline from the past — it’s a continuing risk affecting millions of Americans today.</p><p>The reality is that personal information is more vulnerable than ever, and the responsibility for protecting it increasingly falls on individuals. Reclaiming privacy takes patience, but it’s one of the most important steps in safeguarding identity. Data breaches may never truly become “old news,” but awareness and proactive action can greatly reduce the damage they cause.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/old-news-data-breaches-can-still-cost-you/">‘Old news’ data breaches can still cost you</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your password stinks! (And why that&#8217;s putting everyone at risk)</title>
		<link>https://www.jazzsolutions.com/your-password-stinks-and-why-thats-putting-everyone-at-risk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=your-password-stinks-and-why-thats-putting-everyone-at-risk</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 20:43:13 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14841</guid>

					<description><![CDATA[<p>Your Password Stinks! (And Why That&#8217;s Putting Everyone at Risk)  Let&#8217;s be honest—your password probably stinks. And before you get defensive, hear us out. If you&#8217;re using &#8220;Password123!&#8221; or your dog&#8217;s name followed by your birth year across multiple accounts, [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/your-password-stinks-and-why-thats-putting-everyone-at-risk/">Your password stinks! (And why that’s putting everyone at risk)</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14841" class="elementor elementor-14841" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-aca40dd elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="aca40dd" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-33ca7c9" data-id="33ca7c9" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7f5557b elementor-widget elementor-widget-text-editor" data-id="7f5557b" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b><span data-contrast="none">Your Password Stinks! (And Why That&#8217;s Putting Everyone at Risk)</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Let&#8217;s be honest—your password probably stinks. And before you get defensive, hear us out. If you&#8217;re using &#8220;Password123!&#8221; or your dog&#8217;s name followed by your birth year across multiple accounts, you&#8217;re not alone. But you&#8217;re also making life incredibly easy for cybercriminals.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">The Uncomfortable Truth About Password Reuse</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Most security professionals recommend never using the same password across different accounts. But let&#8217;s face it—this is nearly impossible to track or enforce. We can&#8217;t see your personal passwords (and we shouldn&#8217;t!). But here&#8217;s the scary part: attackers </span><i><span data-contrast="none">can</span></i><span data-contrast="none"> see them.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">How? Through massive data breaches that have exposed billions of credentials over the years.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">Your Adobe Account from 2013 Could Compromise Your Bank Account Today</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Remember that Adobe breach from years ago? Or maybe LinkedIn, MyFitnessPal, or any of the dozens of major breaches? Here&#8217;s a sobering list of just a few:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">LinkedIn: 164 million email addresses and passwords exposed</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Adobe, MyFitnessPal, Fantasy Football sites, University of California, Chegg, and countless others</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p><span data-contrast="none">Every single one of these breaches exposed usernames and passwords. And if you&#8217;re thinking, &#8220;So what? I don&#8217;t even use that old Adobe account anymore&#8221;—think again.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">Enter the World of Credential Stuffing</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Cybercriminals use a technique called &#8220;credential stuffing&#8221; to weaponize these old breaches. As described by </span><a href="https://www.scmagazine.com/news/okta-spots-unprecedented-spike-in-credential-stuffing-attacks"><span data-contrast="none">SC Media</span></a><span data-contrast="none">, it&#8217;s a numbers game where hackers attempt to sign into online services using stolen username/password combinations, banking on the fact that people reuse passwords across multiple sites.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Here&#8217;s how it works: They take your username and password from that old Adobe breach and try it on:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Your work email</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Your Gmail</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Your bank accounts</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Your investment accounts (E*TRADE, Capital One, etc.)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p><span data-contrast="none">Eventually, they get a hit. This is how accounts get compromised, folks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">The Password Spray Attack: When Common Passwords Betray You</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">But wait, it gets worse. Attackers don&#8217;t even need your specific password sometimes. They use &#8220;password spray&#8221; attacks—taking the top 200 most common passwords and trying them against thousands of accounts until they find matches.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Still using &#8220;123456789&#8221; or &#8220;Password1!&#8221; somewhere? You&#8217;re basically leaving your digital front door wide open.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">The Hard Truth from Microsoft</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">According to Microsoft, enabling Multi-Factor Authentication (MFA) makes your account more than 99.9% less likely to be compromised. But here&#8217;s the thing— MFA isn&#8217;t a silver bullet. It just makes you a harder target.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">So What&#8217;s the Solution?</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><ol><li aria-level="3"><b><span data-contrast="none"> Use a Password Manager</span></b></li></ol><p><span data-contrast="none">Password managers are your friend. Here&#8217;s why:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Create unique, ridiculously long passwords for EVERY service (Microsoft 365 even allows up to 256 characters!)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><span data-contrast="none">Your passwords should look more like this <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/27a1.png" alt="➡" class="wp-smiley" style="height: 1em; max-height: 1em;" />  YZA*(yAU$m{8$F$&#8217;^Q&lt;DjNIfci!y_0cu[</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="2"><span data-contrast="none">And less like this <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/27a1.png" alt="➡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Fido_1982!</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">You only need to remember ONE master password</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Protect that password manager with MFA and the longest, strongest password you can create</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ol start="2"><li aria-level="3"><b><span data-contrast="none"> Follow These Password Rules</span></b></li></ol><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Length is king</span></b><span data-contrast="none">: At least 14 characters, but longer is better</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Complexity matters</span></b><span data-contrast="none">: Mix it up with various character types</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Never share</span></b><span data-contrast="none">: Don&#8217;t tell anyone your password—not your spouse, not your neighbor, not tech support</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">No common words</span></b><span data-contrast="none">: They&#8217;re the first things attackers try</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">Can’t Seem to Come Up With a Strong and Unique Password for Each Site?</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="2"><b><span data-contrast="none">No problem</span></b><span data-contrast="none">: Most password managers offer random password generation with parameters that you specify (length, characters, etc.), making it extremely easy to generate a unique password for every service.</span>  </li></ul><ol start="3"><li aria-level="3"><b><span data-contrast="none"> Enable MFA Everywhere</span></b></li></ol><p><span data-contrast="none">Turn on Multi-Factor Authentication on:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Your work accounts</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Personal accounts</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Banking accounts</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Everywhere that offers it</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p><span data-contrast="none">Consider using advanced options like:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Passwordless authentication</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Passkeys</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Windows Hello!</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p><b><span data-contrast="none">The Bottom Line</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Your &#8220;old reliable&#8221; password that you&#8217;ve been using since college? It&#8217;s time to retire it. That clever password with your kid&#8217;s name and birth year? Attackers have seen it before.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">The days of memorizing a handful of passwords and using them everywhere are over. Attackers are counting on your password reuse habits to make their job easy. Don&#8217;t let them.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Take action today:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ol><li aria-setsize="-1" data-leveltext="%1." data-font="Aptos Display" data-listid="7" data-list-defn-props="{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Get a password manager</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="Aptos Display" data-listid="7" data-list-defn-props="{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Generate unique passwords for </span><b><span data-contrast="none">every </span></b><span data-contrast="none">account</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="Aptos Display" data-listid="7" data-list-defn-props="{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Enable MFA wherever possible</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="Aptos Display" data-listid="7" data-list-defn-props="{&quot;335551671&quot;:1,&quot;335552541&quot;:0,&quot;335559683&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Make &#8220;password reuse&#8221; a thing of the past</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><p><span data-contrast="none">Because in today&#8217;s digital world, your password doesn&#8217;t just stink—it&#8217;s potentially putting you, your family, your employer, and your personal data at risk.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Ready to level up your password game? Start with your most important accounts—email, banking, and work—then systematically update everything else. Your future self will thank you.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/your-password-stinks-and-why-thats-putting-everyone-at-risk/">Your password stinks! (And why that’s putting everyone at risk)</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Insider threats: The enemy you know</title>
		<link>https://www.jazzsolutions.com/insider-threats-the-enemy-you-know/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insider-threats-the-enemy-you-know</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 13:03:01 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14831</guid>

					<description><![CDATA[<p>While you&#8217;re busy fortifying your digital walls against hackers, the real threat could already be inside the building. Insider threats are like that trusted friend who knows where you hide your spare key—except sometimes they&#8217;re not so trustworthy.  Here&#8217;s the [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/insider-threats-the-enemy-you-know/">Insider threats: The enemy you know</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14831" class="elementor elementor-14831" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-88bdda7 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="88bdda7" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d1ad4fd" data-id="d1ad4fd" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-66ae8b4 elementor-widget elementor-widget-text-editor" data-id="66ae8b4" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span data-contrast="none">While you&#8217;re busy fortifying your digital walls against hackers, the real threat could already be inside the building. Insider threats are like that trusted friend who knows where you hide your spare key—except sometimes they&#8217;re not so trustworthy.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Here&#8217;s the reality check: </span><b><span data-contrast="none">55% of security incidents come from your own people</span></b><span data-contrast="none">. And before you start side-eyeing your coworkers, most aren&#8217;t plotting against you—they&#8217;re just making expensive mistakes.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p aria-level="2"><b><span data-contrast="none">Follow the Money</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">The numbers are staggering. Organizations are hemorrhaging an average of </span><b><span data-contrast="none">$17.4 million annually</span></b><span data-contrast="none"> from insider incidents. That&#8217;s not a typo. And the biggest culprit? Larry from accounting, who clicked that suspicious email link, not some mastermind spy.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">Quick cost breakdown:</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Negligent employees: $8.8M (ouch)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Malicious insiders: $3.7M (double ouch)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Employees who got outsmarted: $4.8M (triple ouch)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p aria-level="2"><b><span data-contrast="none">It&#8217;s Not Just About Data Theft</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Think insider threats are just about stolen files? Think again. We&#8217;re talking about:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Workplace violence</span></b><span data-contrast="none"> (yes, really)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Corporate espionage</span></b><span data-contrast="none"> (like a bad spy movie)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Sabotage</span></b><span data-contrast="none"> (revenge of the disgruntled employee)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">Good old-fashioned theft</span></b><span data-contrast="none"> (intellectual property is the new gold)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p aria-level="2"><b><span data-contrast="none">Spot the Red Flags</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Your threat radar should ping when you notice:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">The Perpetual Complainer</span></b><span data-contrast="none">: Always griping about work, management, or life in general</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">The Rule Bender</span></b><span data-contrast="none">: &#8220;Security policies are more like guidelines, right?&#8221;</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">The Data Hoarder</span></b><span data-contrast="none">: Downloading files like they&#8217;re preparing for the digital apocalypse</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">The Financial Stress Case</span></b><span data-contrast="none">: Money troubles or sudden mysterious wealth</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">The Walking HR Violation</span></b><span data-contrast="none">: Threats, intimidation, or just generally making people uncomfortable</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p aria-level="2"><b><span data-contrast="none">Time Is Money (Lots of Money)</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Here&#8217;s a sobering fact: </span><b><span data-contrast="none">Organizations that contain incidents quickly spend $10.6M versus $18.7M for the slow responders. </span></b><span data-contrast="none">Speed matters—a lot.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p aria-level="2"><b><span data-contrast="none">The Silver Lining</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><span data-contrast="none">Finally, some good news! Organizations are getting smarter:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">81% now have insider threat programs</span></b><span data-contrast="none"> (up from 77%)</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Detection times are actually improving</span></b><span data-contrast="none"> for the first time ever</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Companies are doubling their security investments</span></b><span data-contrast="none"> because math</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p aria-level="2"><b><span data-contrast="none">Your Action Plan</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335557856&quot;:16777215,&quot;335559738&quot;:60,&quot;335559739&quot;:60}"> </span></p><p><b><span data-contrast="none">See something weird? Say something.</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">It&#8217;s that simple. Research shows </span><b><span data-contrast="none">85% of potential threats leak their plans beforehand. </span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Your coworkers aren&#8217;t mind readers, but they might be the early warning system that prevents the next headline-grabbing security disaster.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">Bottom line:</span></b><span data-contrast="none"> Insider threats aren&#8217;t going away, but with the right awareness and quick action, you can turn your biggest vulnerability into your strongest defense.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><i><span data-contrast="none">Remember: The best firewall is a workforce that that actually cares about security.</span></i><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p aria-level="2"><em><b>Sources</b></em><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:60,&quot;335559739&quot;:60,&quot;335559740&quot;:279}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">JSL Insider Threat Awareness Training. (2025). </span><i><span data-contrast="none">2025 Insider Threat Awareness Training. </span></i><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Ponemon Institute &amp; DTEX Systems. (2025). </span><i><span data-contrast="none">2025 Cost of Insider Risks Global Report</span></i><span data-contrast="none">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">National Counterintelligence and Security Center, National Insider Threat Task Force. (2024). </span><i><span data-contrast="none">Insider Threat Guide: A Compendium of Best Practices to Accompany the National Insider Threat Minimum Standards</span></i><span data-contrast="none">.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Cybersecurity and Infrastructure Security Agency. (2020). </span><i><span data-contrast="none">Insider Threat Mitigation Guide</span></i><span data-contrast="none">. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/insider-threats-the-enemy-you-know/">Insider threats: The enemy you know</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Injection attacks reimagined: How LLMs are the new target</title>
		<link>https://www.jazzsolutions.com/injection-attacks-reimagined-how-llms-are-the-new-target/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=injection-attacks-reimagined-how-llms-are-the-new-target</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 14:06:28 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14773</guid>

					<description><![CDATA[<p>The Large Language Model (LLM) you might soon have connected to your inbox could be introducing more risk than reward into your daily email scroll. In the “good old days” (and by that I mean literally yesterday), attackers exploited websites [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/injection-attacks-reimagined-how-llms-are-the-new-target/">Injection attacks reimagined: How LLMs are the new target</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14773" class="elementor elementor-14773" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-fb8ca14 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="fb8ca14" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d93b0b4" data-id="d93b0b4" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-063d096 elementor-widget elementor-widget-text-editor" data-id="063d096" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span data-contrast="auto">The Large Language Model (LLM) you might soon have connected to your inbox could be introducing more risk than reward into your daily email scroll. In the “good old days” (and by that I mean literally yesterday), attackers exploited websites with sneaky tricks like SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). The formula was simple: take some untrusted input, sneak in malicious instructions, and—voilà—the website or browser would happily run the attacker’s code as if it were your own. Click the wrong link and suddenly your banking login or sensitive data was up for grabs.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><p><span data-contrast="auto">The thing is, those attacks never really went away. And now, with the rapid spread of AI, we’re watching history repeat itself—but this time, the target isn’t your browser. It’s the shiny new LLM quietly connected to your email, calendar, and documents.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><p><span data-contrast="auto">Large language models (LLMs) are being embedded into everyday services — including email — and that creates a new class of attacks that looks strikingly similar to old web injection and session-abuse techniques. In classic SQL injection and cross-site scripting (XSS), attackers hide executable instructions inside otherwise-innocent inputs so a privileged component (a database or a user’s browser) runs them. In cross-site request forgery (CSRF), attackers leverage an already-authenticated session to perform actions the user never intended. Modern prompt-injection and agent attacks do the same thing: specially crafted emails or documents contain natural-language instructions that an LLM or an automated agent treats as commands. Because those agents often have privileged connections (email, contacts, cloud drives, API tokens), they can exfiltrate data or perform actions without the human ever reading or consenting. Recent research and reporting demonstrate proof-of-concept exfiltration and agent attacks, underscoring why organizations should treat LLM connectors like any other sensitive integration.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><p aria-level="3"><b><span data-contrast="none">Sidebar: Enterprise Controls for LLM-Connected Email</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></p><p><i><span data-contrast="auto">(A quick-hit checklist for security &amp; risk teams)</span></i><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Least privilege:</span></b><span data-contrast="auto"> Limit OAuth scopes and remove “all mail” or “export contacts” access unless absolutely necessary.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">No auto-execute:</span></b><span data-contrast="auto"> Block agents from automatically carrying out commands embedded in untrusted content.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Human-in-the-loop:</span></b><span data-contrast="auto"> Require explicit user confirmation for risky actions (e.g., sending mail, exporting contacts, sharing docs).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">Logging &amp; audit:</span></b><span data-contrast="auto"> Record all agent-initiated actions, including raw inputs, for at least X days.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="auto">Adversarial testing:</span></b><span data-contrast="auto"> Continuously fuzz agents with known prompt-injection payloads before production use.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="6" data-aria-level="1"><b><span data-contrast="auto">Anomaly detection:</span></b><span data-contrast="auto"> Monitor for mass data exports or unusual outbound requests from agent accounts.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><p aria-level="3"><b><span data-contrast="none">Final Thoughts: Déjà Vu, But With AI</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}"> </span></p><p aria-level="3"><span data-contrast="auto">If all this sounds familiar, it should. We’ve been here before. SQL injection, XSS, and CSRF taught us that whenever software blindly trusts input, bad things happen. Now, LLMs are walking down the same path—</span><span data-contrast="none">except </span><span data-contrast="auto">instead of parsing web forms or browser cookies, they’re parsing our emails, calendars, and business data. And unlike the early web, these tools don’t just display information—they can act on it. That makes them powerful, but also dangerous.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><p><span data-contrast="auto">Organizations can’t afford to treat this as a “future problem.” The attacks are already here, and they’re only going to get more convincing. The decision to connect an LLM to email or documents should </span><i><span data-contrast="auto">always</span></i><span data-contrast="auto"> come with a risk assessment, guardrails, and monitoring in place.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><p><span data-contrast="auto">Because at the end of the day, this isn’t just about stopping hackers—it’s about making sure the AI sitting in your inbox works for you, not against you.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><p><b><span data-contrast="auto">Sources</span></b><span data-contrast="auto">: </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">Ars Technica — “New attack on ChatGPT research agent pilfers secrets from Gmail inboxes” (report of agent-based Gmail exfiltration). </span><a href="https://arstechnica.com/information-technology/2025/09/new-attack-on-chatgpt-research-agent-pilfers-secrets-from-gmail-inboxes/?utm_source=chatgpt.com"><span data-contrast="none">Ars Technica</span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="8" data-aria-level="1"><span data-contrast="auto">OWASP — XSS and CSRF primer (classic web injection/session-abuse definitions). </span><a href="https://owasp.org/www-community/attacks/xss/?utm_source=chatgpt.com"><span data-contrast="none">OWASP+1</span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">OWASP GenAI — “Prompt Injection” entry and mitigations. </span><a href="https://genai.owasp.org/llmrisk/llm01-prompt-injection/?utm_source=chatgpt.com"><span data-contrast="none">OWASP Gen AI Security Project</span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="10" data-aria-level="1"><span data-contrast="auto">Wired — “Imprompter” research showing prompt techniques that extract personal data. </span><a href="https://www.wired.com/story/ai-imprompter-malware-llm?utm_source=chatgpt.com"><span data-contrast="none">WIRED</span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="11" data-aria-level="1"><span data-contrast="auto">arXiv / academic work on agent/LLM attack surfaces (systematic agent exploits). </span><a href="https://arxiv.org/html/2507.06850v4?utm_source=chatgpt.com"><span data-contrast="none">arXiv</span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="12" data-aria-level="1"><span data-contrast="auto">CSO Online – “Meet ShadowLeak: ‘Impossible to detect’ data theft using AI” (</span><a href="https://www.csoonline.com/article/4059606/meet-shadowleak-impossible-to-detect-data-theft-using-ai.html)"><span data-contrast="none">https://www.csoonline.com/article/4059606/meet-shadowleak-impossible-to-detect-data-theft-using-ai.html)</span></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/injection-attacks-reimagined-how-llms-are-the-new-target/">Injection attacks reimagined: How LLMs are the new target</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How AI is transforming both cybersecurity and cybercrime</title>
		<link>https://www.jazzsolutions.com/how-ai-is-transforming-both-cybersecurity-and-cybercrime/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-ai-is-transforming-both-cybersecurity-and-cybercrime</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 13:51:15 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14767</guid>

					<description><![CDATA[<p>Artificial Intelligence is revolutionizing how we work, communicate, and solve problems. But as organizations harness AI&#8217;s power for innovation and efficiency, cybercriminals are weaponizing the same technology to launch sophisticated attacks at unprecedented speeds.  The New Reality: Lightning-Fast Breaches  Recent [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/how-ai-is-transforming-both-cybersecurity-and-cybercrime/">How AI is transforming both cybersecurity and cybercrime</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14767" class="elementor elementor-14767" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-83807ee elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="83807ee" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dabaa63" data-id="dabaa63" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-97d25ce elementor-widget elementor-widget-text-editor" data-id="97d25ce" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span data-contrast="none">Artificial Intelligence is revolutionizing how we work, communicate, and solve problems. But as organizations harness AI&#8217;s power for innovation and efficiency, cybercriminals are weaponizing the same technology to launch sophisticated attacks at unprecedented speeds.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">The New Reality: Lightning-Fast Breaches</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Recent research from ReliaQuest, as reported by TechRadar, reveals a sobering truth about our current cybersecurity landscape. Cybercriminals leveraging AI tools can now breach systems faster than ever before, with the average time between initial access and lateral movement shrinking to just 48 minutes. This dramatic acceleration means organizations have less than an hour to detect and respond to intrusions before attackers can spread throughout their networks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">This speed isn&#8217;t just about raw computing power—it&#8217;s about AI&#8217;s ability to automate reconnaissance, identify vulnerabilities, and adapt attack strategies in real-time. What once took hackers days, weeks, or months to accomplish can now happen before your security team finishes their morning coffee.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">The AI Arms Race: Defenders Playing Catch-Up</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">The urgency of this threat hasn&#8217;t been lost on government agencies. As reported by CyberScoop, federal agencies are scrambling to deploy AI for cyber defense, with leaders like former NSA advisor Mike Duffy warning that adversaries are &#8220;already using AI&#8221; in their attacks. This creates what Duffy calls an imperative for defenders to &#8220;move quickly&#8221; or risk falling behind in an accelerating technological arms race.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">The challenge is particularly acute for government and critical infrastructure sectors, where the stakes of a successful breach extend beyond financial losses to national security implications. Federal agencies are exploring AI applications ranging from automated threat detection to predictive analytics, but implementation faces hurdles including data quality issues, integration challenges, and the need for skilled personnel.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">The Human Factor Remains Critical</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Despite these technological advances, one element remains stubbornly constant: human vulnerability. Social engineering attacks continue to evolve alongside AI capabilities, proving that the weakest link in any security chain is often the person behind the keyboard.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">Voice phishing (or &#8220;vishing&#8221;) attacks now account for 14% of breaches, with the manufacturing sector particularly vulnerable. According to the ReliaQuest research cited in TechRadar, this vulnerability stems from the sector&#8217;s &#8220;frequent IT interactions and lenient help-desk policies&#8221; needed to manage high support volumes. Cybercriminals exploit these necessary business practices, using AI-generated voices and sophisticated scripts to impersonate IT personnel or trusted vendors.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">What This Means for Your Organization</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">The convergence of AI-powered attacks and social engineering creates a perfect storm of cyber risk. Whether you&#8217;re a federal agency protecting national assets or a private company safeguarding customer data, the playbook remains similar:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ol><li aria-setsize="-1" data-leveltext="%1." data-font="system-ui" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Accelerate Detection and Response</span></b><span data-contrast="none">: With breach-to-movement times measured in minutes, traditional security monitoring isn&#8217;t enough. Follow the federal government&#8217;s lead in exploring AI-powered defense systems that can match the speed of AI-enhanced attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="system-ui" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Strengthen Human Defenses</span></b><span data-contrast="none">: Regular security awareness training must evolve beyond annual checkbox exercises. Employees need ongoing education about emerging threats, including AI-generated phishing attempts and deepfake technologies.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="system-ui" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Verify, Then Trust</span></b><span data-contrast="none">: Implement robust verification procedures for all sensitive requests, especially those involving system access or financial transactions. If something seems urgent or unusual, that&#8217;s precisely when extra caution is needed.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="system-ui" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">Sector-Specific Vigilance</span></b><span data-contrast="none">: Industries with high support volumes or complex supply chains should pay special attention to voice-based social engineering attacks. Consider implementing callback procedures or multi-factor authentication for phone-based support requests.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><ol><li aria-setsize="-1" data-leveltext="%1." data-font="system-ui" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">Learn from Federal Initiatives</span></b><span data-contrast="none">: While private sector organizations may not have the same resources as federal agencies, they can benefit from monitoring government AI initiatives and adapting successful strategies to their own environments.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ol><p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><b><span data-contrast="none">Looking Ahead</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">The AI arms race in cybersecurity is just beginning. As defensive AI systems become more sophisticated, so too will the attacks they&#8217;re designed to prevent. The federal government&#8217;s push to rapidly adopt AI for cyber defense underscores a critical reality: organizations that delay AI implementation risk being outmaneuvered by adversaries who are already weaponizing these technologies.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">The key to survival isn&#8217;t choosing between technological solutions and human awareness—it&#8217;s understanding that effective cybersecurity requires both. In an age where AI can breach systems in minutes and convincingly mimic human voices, our best defense combines cutting-edge technology with old-fashioned skepticism and verification.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><p><span data-contrast="none">After all, whether the attack comes from an AI algorithm or a traditional hacker, the goal remains the same: compromising your systems and stealing your data. The tools may be evolving at breakneck speed, but vigilance, verification, and a healthy dose of caution remain our most reliable defenses.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="none">*Sources:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><a href="https://www.techradar.com/pro/ai-means-hackers-are-faster-than-ever-research-reveals"><span data-contrast="none">&#8220;AI means hackers are faster than ever, research reveals&#8221; </span></a><span data-contrast="none">&#8211; TechRadar, reporting on research from ReliaQuest</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><a href="https://cyberscoop.com/federal-agencies-ai-cyber-defense-mike-duffy-ciso/"><span data-contrast="none">&#8220;Federal agencies are looking to AI for cyber defense as adversaries do the same&#8221; </span></a><span data-contrast="none">&#8211; CyberScoop</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/how-ai-is-transforming-both-cybersecurity-and-cybercrime/">How AI is transforming both cybersecurity and cybercrime</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ClickFix: The social engineering attack disguised as technical support</title>
		<link>https://www.jazzsolutions.com/clickfix-the-social-engineering-attack-disguised-as-technical-support/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=clickfix-the-social-engineering-attack-disguised-as-technical-support</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 15:46:46 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14705</guid>

					<description><![CDATA[<p>A new wave of cyberattacks is exploiting users&#8217; trust in routine computer processes through a technique known as &#8220;ClickFix.&#8221; This sophisticated social engineering method tricks victims into manually executing malicious scripts by disguising the attack as a standard verification or [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/clickfix-the-social-engineering-attack-disguised-as-technical-support/">ClickFix: The social engineering attack disguised as technical support</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14705" class="elementor elementor-14705" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-8f4b911 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8f4b911" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95dd216" data-id="95dd216" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a91d4ab elementor-widget elementor-widget-text-editor" data-id="a91d4ab" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>A new wave of cyberattacks is exploiting users&#8217; trust in routine computer processes through a technique known as &#8220;ClickFix.&#8221; This sophisticated social engineering method tricks victims into manually executing malicious scripts by disguising the attack as a standard verification or troubleshooting procedure.</p><p><strong>How ClickFix Works</strong></p><p>The ClickFix attack begins when a user encounters what appears to be a technical error or verification requirement. Unlike traditional phishing that relies on malicious links or attachments, ClickFix manipulates users into becoming unwitting accomplices in their own system compromise.</p><p>The attack typically unfolds in three stages:</p><ol><li><strong>Initial Contact</strong>: Victims encounter a fake error message, often on compromised websites or through phishing emails. These messages mimic legitimate system errors or CAPTCHA verification screens.</li><li><strong>The &#8220;Fix&#8221; Instructions</strong>: Users are presented with what appears to be helpful technical support instructions. A common sequence involves:<ol><li>Pressing Windows + R to open the Run dialog</li><li>Using CTRL + V to paste a command (already copied to their clipboard)</li><li>Pressing Enter to execute</li></ol></li><li><strong>Payload Delivery</strong>: The executed command downloads and installs malware, ranging from information stealers to remote access tools.</li></ol><p><strong>Current Campaign Trends</strong></p><p>According to recent analysis by Group-IB, ClickFix campaigns have evolved significantly since their emergence. The technique has been adopted by various threat actors, from cybercriminals to state-sponsored groups.</p><p>Proofpoint researchers have identified several nation-state actors employing ClickFix:</p><ul><li><strong>North Korean-affiliated TA427</strong> targeted think tanks with emails leading to QuasarRAT malware installation</li><li><strong>Iranian-linked TA450</strong> impersonated Microsoft security updates to deploy remote management tools</li><li><strong>Russian-suspected UNK_RemoteRogue</strong> focused on defense contractors using fake Office error pages</li></ul><p><strong>Industry-Specific Targeting</strong></p><p>The hospitality sector has become a particular focus for ClickFix campaigns. As reported by KrebsOnSecurity, attackers are impersonating Booking.com to target hotel staff with messages about negative reviews or booking inquiries. These campaigns exploit the industry&#8217;s customer-service mindset, where employees are conditioned to quickly resolve guest issues.</p><p>The KongTuke campaign, active since September 2024, demonstrates the scale of these operations. It uses compromised websites to inject scripts that collect system information before redirecting users to malicious payloads.</p><p><strong>Recognition and Prevention</strong></p><p>Users should be alert to several red flags:</p><ul><li>Any &#8220;error fix&#8221; requiring manual command execution</li><li>CAPTCHA or verification processes asking for keyboard shortcuts</li><li>Pop-ups with step-by-step instructions involving the Run dialog</li><li>HTML email attachments claiming to be Office documents</li></ul><p>Legitimate technical support will never ask users to:</p><ul><li>Open Run commands and paste unknown scripts</li><li>Bypass security warnings through manual processes</li><li>Execute PowerShell commands to &#8220;fix&#8221; viewing issues</li></ul><p><strong>Protecting Your Organization</strong></p><p>Organizations can implement several measures to combat ClickFix attacks:</p><ol><li><strong>User Education</strong>: Train employees to recognize social engineering tactics, especially those mimicking technical support</li><li><strong>Email Security</strong>: Deploy advanced email filtering to detect HTML attachments with embedded scripts</li><li><strong>Endpoint Protection</strong>: Ensure systems can detect and block PowerShell abuse</li><li><strong>Incident Reporting</strong>: Establish clear channels for reporting suspicious &#8220;fix&#8221; instructions</li></ol><p><strong>The Evolution Continues</strong></p><p>What makes ClickFix particularly concerning is its adaptability. Attackers continuously refine their lures, from fake browser updates to document viewing errors. The technique&#8217;s success relies not on technical vulnerabilities but on human psychology—our instinct to follow instructions when faced with technical problems.</p><p>As Group-IB notes, the variety of ClickFix implementations suggests this technique will remain a persistent threat. Organizations must prepare their users to think critically when encountering any &#8220;helpful&#8221; error resolution steps, especially those requiring manual command execution.</p><p>If you encounter suspicious verification requests or error fixes requiring the Windows + R sequence, stop immediately and contact your IT security team before proceeding.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/clickfix-the-social-engineering-attack-disguised-as-technical-support/">ClickFix: The social engineering attack disguised as technical support</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government transitions create perfect storm for cybercriminals</title>
		<link>https://www.jazzsolutions.com/government-transitions-create-perfect-storm-for-cybercriminals/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-transitions-create-perfect-storm-for-cybercriminals</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 15:40:43 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14700</guid>

					<description><![CDATA[<p>Political transitions and government shake-ups dominate headlines, but there&#8217;s a hidden danger most people don&#8217;t consider: cybercriminals are watching these events closely, ready to exploit the uncertainty they create. The Psychology Behind the Attack: Fear, Uncertainty, and Doubt Major political [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/government-transitions-create-perfect-storm-for-cybercriminals/">Government transitions create perfect storm for cybercriminals</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14700" class="elementor elementor-14700" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-da15dbf elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="da15dbf" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15d32fe" data-id="15d32fe" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-65cb957 elementor-widget elementor-widget-text-editor" data-id="65cb957" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Political transitions and government shake-ups dominate headlines, but there&#8217;s a hidden danger most people don&#8217;t consider: cybercriminals are watching these events closely, ready to exploit the uncertainty they create.</p><h5><strong>The Psychology Behind the Attack: Fear, Uncertainty, and Doubt</strong></h5><p>Major political changes naturally create what cybersecurity professionals call &#8220;FUD&#8221; – Fear, Uncertainty, and Doubt. Government employees worry about job security, contractors fear losing contracts, and citizens question what changes mean for services they depend on.</p><p>This emotional vulnerability is exactly what cybercriminals look for. When people are anxious and uncertain, they&#8217;re more likely to:</p><ul><li>Act quickly without thinking critically</li><li>Trust urgent-sounding communications</li><li>Bypass normal verification processes</li><li>Share sensitive information to &#8220;protect&#8221; themselves</li></ul><h5> </h5><h5><strong>Inside the Criminal Mindset</strong></h5><p>Cybersecurity professionals often ask, &#8220;If I were a scammer, how would I approach this?&#8221; It&#8217;s a valuable exercise that reveals how criminals think.</p><p>During government transitions, a scammer might:</p><ol><li>Research government agencies and their contractors through public sources</li><li>Create fake personas representing officials, HR departments, or &#8220;transition teams&#8221;</li><li>Launch multi-channel campaigns using email, text, phone calls, and even physical mail</li><li>Craft messages that exploit current fears about job security, contract changes, or policy shifts</li></ol><p>The key is that these attacks feel timely and relevant – exactly what you&#8217;d expect to receive during uncertain times.</p><h5><strong>Red Flags to Watch For</strong></h5><p>Whether you work in government, contracting, or any organization that intersects with public sector work, be alert for:</p><p><strong>Unusual Communications:</strong></p><ul><li>Contact from government agencies or officials outside normal channels</li><li>Urgent requests claiming to be related to &#8220;transition activities&#8221; or &#8220;security reviews&#8221;</li><li>Messages asking you to verify employment, clearance status, or personal information</li></ul><p><strong>Suspicious Access Requests:</strong></p><ul><li>Requests for system access from unfamiliar people or organizations</li><li>Pressure to provide access &#8220;immediately&#8221; due to &#8220;transition requirements&#8221;</li><li>Bypassing established verification procedures for &#8220;emergency&#8221; situations</li></ul><p><strong>Social Media Targeting:</strong></p><ul><li>Unexpected LinkedIn messages from &#8220;government personnel&#8221; or journalists</li><li>Requests for interviews or information about your work or organization</li><li>Friend/connection requests from profiles that seem too good to be true</li></ul><h5> </h5><h5><strong>Your Defense Strategy</strong></h5><ol><li><strong>Pause and Verify:</strong> When you receive unexpected communications, take time to verify through official channels before responding.</li><li><strong>Follow Established Procedures:</strong> Legitimate requests will follow proper protocols. If someone asks you to bypass normal procedures, that&#8217;s a red flag.</li><li><strong>Trust Your Instincts:</strong> If something feels off, it probably is. Don&#8217;t be afraid to ask questions or seek guidance.</li><li><strong>Report Suspicious Activity:</strong> Alert your IT/security team, manager, or relevant authorities about suspicious communications.</li></ol><h5> </h5><h5><strong>Creating a Culture of Security</strong></h5><p>Organizations should foster environments where employees feel comfortable reporting potential threats without fear of judgment. The goal isn&#8217;t to create paranoia, but to maintain healthy skepticism during vulnerable periods.</p><p>Remember: cybercriminals count on our human nature – our desire to be helpful, our fear of getting in trouble, and our tendency to act quickly under pressure. By understanding these tactics and staying vigilant during times of change, we can protect ourselves and our organizations from those who would exploit uncertainty for criminal gain.</p><p><em>Stay informed about cybersecurity threats by following trusted sources and keeping your organization&#8217;s security team in the loop about suspicious activities.</em></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/government-transitions-create-perfect-storm-for-cybercriminals/">Government transitions create perfect storm for cybercriminals</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scammers love a sale more than you do</title>
		<link>https://www.jazzsolutions.com/scammers-love-a-sale-more-than-you-do/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=scammers-love-a-sale-more-than-you-do</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 15:26:50 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14695</guid>

					<description><![CDATA[<p>“Prime Day starts now!” And with it… a wave of scams. In the weeks leading up to Prime Day, researchers uncovered hundreds — even up to 120,000 — fake websites spun up to exploit the hype. That’s not unique to Amazon. [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/scammers-love-a-sale-more-than-you-do/">Scammers love a sale more than you do</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14695" class="elementor elementor-14695" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-bce2a20 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bce2a20" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6145a6" data-id="f6145a6" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-936e461 elementor-widget elementor-widget-text-editor" data-id="936e461" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>“Prime Day starts now!”<br /> And with it… a wave of scams.</p><p>In the weeks leading up to Prime Day, researchers uncovered hundreds — even up to 120,000 — fake websites spun up to exploit the hype. That’s not unique to Amazon. Every major shopping event — from Black Friday to back-to-school sales — sparks the same scammer gold rush.</p><p>Why? Because scammers know:</p><ul><li>We’re hunting for deals.</li><li>Urgency makes us click before we think.</li><li>It’s the perfect storm: urgency + FOMO + shiny discounts.</li></ul><p>Here’s how scammers cash in:</p><ul><li>Fake shopping sites that look almost identical to the real ones.</li><li>Emails or texts about “account issues” or “shipment problems.”</li><li>Too-good-to-be-true deals that make your brain skip the logic check.</li></ul><p>How to stay scam-proof — no matter the sale:</p><ul><li>Always start from a place you already trust: your existing bookmarks, your password manager, or by typing the known legitimate URL directly (e.g., amazon.com — not whatever link just showed up in your inbox).</li><li>Don’t trust deals that come to you in an email, text, or popup. If it looks tempting, go to the real site yourself and see if it’s actually there.</li><li>Breathe before you click. Scammers feed on urgency. If you slow down, you win.</li></ul><p>At the end of the day, the best deal isn’t the one that saves you $50 on a gadget. It’s the one where you don’t hand over your credit card, account login, or personal data to a scammer.</p><p>Because the ultimate too-good-to-be-true deal? That’s the one the scammer offers you.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/scammers-love-a-sale-more-than-you-do/">Scammers love a sale more than you do</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How AI-generated code can introduce security risks through &#8216;slopsquatting&#8217; — and how to prevent it</title>
		<link>https://www.jazzsolutions.com/how-ai-generated-code-can-introduce-security-risks-through-slopsquatting-and-how-to-prevent-it/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-ai-generated-code-can-introduce-security-risks-through-slopsquatting-and-how-to-prevent-it</link>
		
		<dc:creator><![CDATA[JSL Staff]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 15:13:29 +0000</pubDate>
				<category><![CDATA[Cyber in 60]]></category>
		<guid isPermaLink="false">https://www.jazzsolutions.com/?p=14690</guid>

					<description><![CDATA[<p>As artificial intelligence becomes increasingly integrated into software development workflows, a new security threat has emerged: &#8220;slopsquatting.&#8221; This risk affects any organization using AI tools to generate code, making it crucial for development teams to understand and address this vulnerability. [&#8230;]</p>
<p>The post <a href="https://www.jazzsolutions.com/how-ai-generated-code-can-introduce-security-risks-through-slopsquatting-and-how-to-prevent-it/">How AI-generated code can introduce security risks through ‘slopsquatting’ — and how to prevent it</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="14690" class="elementor elementor-14690" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-50d4f43 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="50d4f43" data-element_type="section" data-settings="{&quot;avante_ext_is_background_backdrop&quot;:&quot;false&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-220d8b5" data-id="220d8b5" data-element_type="column" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-61c5758 elementor-widget elementor-widget-text-editor" data-id="61c5758" data-element_type="widget" data-settings="{&quot;avante_ext_is_scrollme&quot;:&quot;false&quot;,&quot;avante_ext_is_smoove&quot;:&quot;false&quot;,&quot;avante_ext_is_parallax_mouse&quot;:&quot;false&quot;,&quot;avante_ext_is_infinite&quot;:&quot;false&quot;,&quot;avante_ext_mobile_static&quot;:&quot;false&quot;,&quot;avante_ext_link_sidemenu&quot;:&quot;false&quot;,&quot;avante_ext_link_fullmenu&quot;:&quot;false&quot;,&quot;avante_ext_link_closed_fullmenu&quot;:&quot;false&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>As artificial intelligence becomes increasingly integrated into software development workflows, a new security threat has emerged: &#8220;slopsquatting.&#8221; This risk affects any organization using AI tools to generate code, making it crucial for development teams to understand and address this vulnerability.</p><p><strong>What is Slopsquatting?</strong></p><p>According to a recent <a href="https://www.bleepingcomputer.com/news/security/ai-hallucinated-code-dependencies-become-new-supply-chain-risk/">BleepingComputer article </a>, security researcher Seth Larson coined the term &#8220;slopsquatting&#8221; as a variation of typosquatting.</p><p>Typosquatting is a well-known attack method that exploits human typing errors. While it commonly affects everyday internet users who misspell URLs and end up on malicious websites, it also targets developers who might mistype package names when installing dependencies.</p><p>Slopsquatting, however, is a new threat that specifically targets developers using AI coding assistants. Instead of relying on human typing errors, it exploits a different vulnerability: AI hallucinations.</p><p>When large language models (LLMs) generate code, they sometimes &#8220;hallucinate&#8221; – creating references to packages that don&#8217;t exist or inadvertently suggesting malicious ones. Threat actors can then create harmful packages with these AI-suggested names on repositories like PyPI and npm, waiting for unsuspecting developers to install them.</p><p>The scale of this problem is significant. Socket researchers found that &#8220;58% of hallucinated packages were repeated more than once across ten runs, indicating that a majority of hallucinations are not just random noise, but repeatable artifacts of how the models respond to certain prompts.&#8221;</p><p><strong>A Simple but Effective Prevention Strategy </strong></p><p>The good news is that slopsquatting can be prevented through proper oversight and expertise. Organizations should implement clear standards requiring:</p><ol><li><strong>Subject Matter Expertise</strong>: Anyone using AI for coding must have expertise in the programming languages and frameworks they&#8217;re working with. AI should enhance capabilities, not replace fundamental knowledge.</li><li><strong>Thorough Code Review</strong>: All AI-generated code must undergo comprehensive review by experienced developers before implementation. This includes verifying all package dependencies and imports.</li><li><strong>Security Best Practices</strong>:<ol><li>Follow your organization&#8217;s policies regarding proprietary code and AI tools – public AI services require extra caution</li><li>Always validate AI-generated code before use</li><li>Verify all package names and dependencies against official repositories</li><li>Question any unfamiliar packages suggested by AI</li></ol></li></ol><p><strong>Why This Matters </strong></p><p>AI tools are powerful productivity enhancers for software development. When used correctly, they can accelerate coding, reduce errors, and help developers explore new solutions. However, like any tool, they require skilled operation and appropriate safeguards.</p><p>By ensuring that AI-generated code undergoes the same rigorous review process as human-written code – with particular attention to package dependencies – organizations can harness the benefits of AI while protecting against emerging threats like slopsquatting.</p><p><strong>Moving Forward </strong></p><p>As AI continues to evolve, so too will the security challenges it presents. Organizations must stay informed about emerging threats and maintain robust security practices. The key is not to avoid AI tools but to use them responsibly with appropriate expertise and oversight.</p><p>For development teams looking to safely integrate AI into their workflows, consider establishing clear policies that balance innovation with security. Remember: AI is a powerful assistant, but human expertise remains irreplaceable when it comes to ensuring code security and integrity.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.jazzsolutions.com/how-ai-generated-code-can-introduce-security-risks-through-slopsquatting-and-how-to-prevent-it/">How AI-generated code can introduce security risks through ‘slopsquatting’ — and how to prevent it</a> first appeared on <a href="https://www.jazzsolutions.com">Jazz Solutions, Inc. (JSL)</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Content Delivery Network Full Site Delivery via cloudfront

Served from: www.jazzsolutions.com @ 2026-03-30 20:23:18 by W3 Total Cache
-->