Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Splunk.conf: Splunk urges users to eat their ‘cyber veggies’ | Computer Weekly

By Computer Weekly by By Computer Weekly
September 9, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Organisations’ lack of attention to some of the most basic tenets of cyber hygiene not only continues to hamstring defenders but increasingly leaves the door wide not only to career cyber criminals using tried-and-tested tactics, but also less sophisticated actors exploiting artificial intelligence (AI) agents and models to power attacks at scale in an emerging phenomenon that experts at data observability specialist Splunk are calling vibe-hacking.

Speaking at a session held at this year’s Splunk.conf, taking place in Boston this week, Splunk cyber executives lamented poor security practice and called on businesses to “eat their cyber vegetables”, while acknowledging that CISOs have a mountain to climb to do so.

Ryan Fetterman, senior security strategist at Cisco Foundation AI and Splunk SURGe, his historical position had been to tell people not to get too worked up about AI changing the nature of cyber attacks, because threat actors were typically using such models to recreate the same methodologies favoured by humans, albeit at scale and more efficiently.

However, he said, this was clearly now changing. He noted in particular the emergence of an AI-powered ransomware PromptLock – which was discovered by ESET researchers at the end of August – although this turned out to be a proof of concept (PoC) developed by engineers at the Tandon School of Engineering at New York University (NYU),

“Cyber vegetables are important,” said Fetterman. “The reason for that is because the bar has been lowered for attackers using AI to scale their attacks and require less sophistication to do the things that they want to do. That makes it easier to find the low-hanging fruit for things like ransomware.”

Fetterman detailed an example of a ransomware incident in which the threat actor engaged in vibe-hacking – a nefarious bedfellow to the marginally more benign vibe-coding phenomenon.

He explained how the attacker used an AI agent to help conduct a full ransomware attack chain from initial target reconnaissance to vulnerability exploitation to execution and encryption. If this wasn’t already bad enough, they were also able to scale this attack chain across a total of 16 victims.

“I think that is scary because that can obviously scale to more attackers and scale to more victims, and now the targets that may not have been appealing from a financial perspective previously can in aggregate bring more of a return for those attackers, and maybe organisations that would have been lower on the priority list are fair game,” said Fetterman.

Splunk CISO Michael Fanning told Computer Weekly that nailing the basics was the most important part of any cyber security programme.

“I think very often we chase these shiny new technologies and capabilities and often they are a solution looking for a problem,” he said. “We  need to think about what are the problems we’re trying to solve.

“When you learn how to play basketball, you start by learning how to make a layup, how to shoot free throws, how to play defense – and those are some of the hallmarks of a good team, there’s nothing fancy about that,” added Fanning. “The same is true with running cyber security – really nailing the basics in the core domains of cyber security is just an integral part of actually protecting your environment.”

Fanning acknowledged that it is understandable that some security leaders might give into novelty. However, he added: “Usually when that happens that’s indicative of a lack of strategy for your organisation.”

Security leaders who have defined their top security initiatives and objectives can better keep their teams focused on what truly matters, and on the right track, and avoid such “pet projects” that serve only to distract and increase risk, said Fanning.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Fund aims to let investors tail Bill Ackman’s trades following success of Warren Buffett copycat ETF

Fund aims to let investors tail Bill Ackman's trades following success of Warren Buffett copycat ETF

Recommended.

Groupize Revolutionizes Sunshine Act Compliance and HCP Event Management with AI-Powered Solutions

Groupize Revolutionizes Sunshine Act Compliance and HCP Event Management with AI-Powered Solutions

March 18, 2025
NexusTek CEO: ‘GenAI Isn’t Just A Concept, It’s In Production Solving Real Problems’

NexusTek CEO: ‘GenAI Isn’t Just A Concept, It’s In Production Solving Real Problems’

May 30, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio