You’re all signed up for Risk Channel
Thank you for your interest in our service.
Watch out for a confirmation email from our subscriptions team. Once you have confirmed you will join the worldwide community of over 14,000 subscribers who are receiving daily Risk intelligence to lead, innovate and grow.
Note: Due to the nature of this message you may find this in your "promotions" or "spam" folders, please check there. If nothing arrives within a few minutes let us know. If you do not receive this email we will be happy to help get you set up.
Adding the email address riskchannel@emm.us.com, will help to ensure all newsletters arrive directly to your inbox.
Recent Editions
Risk Channel
North America
Verizon has said software flaws rather than stolen passwords have become the dominant entry point for hackers. In a review of more than 31,000 incidents in its annual Data Breach Investigations Report, Verizon found 31% started with vulnerability exploitation. The report said attackers are using AI to spot and exploit known vulnerabilities at machine speed, with the technology accelerating attacks from months to hours. Hackers are “demonstrably using GenAI to help at different stages of attack including targeting, initial access, and development of malware and other tools . . . AI’s primary impact is currently operational: automating and scaling techniques defenders already know how to detect, not yet unlocking these novel or rare attack surfaces.” Meanwhile, employees are not waiting for IT approval before adopting AI tools. Unapproved AI usage at work tripled from 15% to 45% of the workforce, making “shadow AI” the third most common source of non-malicious data leakage.
Full Issue
Risk Channel
UK/Europe
Verizon has said software flaws rather than stolen passwords have become the dominant entry point for hackers. In a review of more than 31,000 incidents in its annual Data Breach Investigations Report, Verizon found 31% started with vulnerability exploitation. The report said attackers are using AI to spot and exploit known vulnerabilities at machine speed, with the technology accelerating attacks from months to hours. Hackers are “demonstrably using GenAI to help at different stages of attack including targeting, initial access, and development of malware and other tools . . . AI’s primary impact is currently operational: automating and scaling techniques defenders already know how to detect, not yet unlocking these novel or rare attack surfaces.” Meanwhile, employees are not waiting for IT approval before adopting AI tools. Unapproved AI usage at work tripled from 15% to 45% of the workforce, making “shadow AI” the third most common source of non-malicious data leakage.
Full Issue