“Living off the land” used to mean surviving on natural resources. In cybersecurity today, it describes something far more concerning: attackers using the legitimate tools already built into operating systems like Windows to carry out malicious actions. Instead of bringing in obvious hacking software, attackers operate through trusted utilities—PowerShell, WMI, certutil, and even remote management […]
Terri Harris
When AI Gets Fooled: The Rise of Prompt Injection Attacks
AI’s Achilles’ Heel Comes Into Focus Prompt injection attacks, where attackers try to exploit vulnerabilities in how LLMs (Large Language Models) process information and generate responses, can be used for malicious intent. This is done by tapping into the difficulty LLMs have differentiating between developer-defined system instructions and user-provided input. For example, imagine a chatbot […]
FBI Warning: 13 Routers Vulnerable to Hackers
FBI Alert The FBI has issued a warning pertaining to the vulnerability of 13 routers currently being used. You may be using a router that is a standalone device, or part of a modem provided by your Internet service provider. And, you may have more than one router in your office or home. Protecting your […]
The Importance of Securing Your Data
How Important is it to You to Secure Your Data? It is more important than ever, especially in today’s climate, to protect your company data from internal and external threats. The average breach will cost a company just under 5 million dollars and the cost is only expected to increase. Perpetual Storage, Inc. can […]
Offline Storage is Imperative for Today’s Data Protection!
Offline Storage is more important now than ever! Over 59% of organizations have experienced a ransomware attack within the past year. The average cost per organization is now over 2 million dollars. These attacks have become more sophisticated, and with the addition of AI, attacks are also becoming more effective. The use of ransomware is […]