Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Wednesday, September 10
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Splunk.conf: Splunk urges users to eat their ‘cyber veggies’
    Latest News

    Splunk.conf: Splunk urges users to eat their ‘cyber veggies’

    TeamBy TeamSeptember 10, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Splunk.conf: Splunk urges users to eat their ‘cyber veggies’
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Organisations’ lack of attention to some of the most basic tenets of cyber hygiene not only continues to hamstring defenders but increasingly leaves the door wide not only to career cyber criminals using tried-and-tested tactics, but also less sophisticated actors exploiting artificial intelligence (AI) agents and models to power attacks at scale in an emerging phenomenon that experts at data observability specialist Splunk are calling vibe-hacking.

    Speaking at a session held at this year’s Splunk.conf, taking place in Boston this week, Splunk cyber executives lamented poor security practice and called on businesses to “eat their cyber vegetables”, while acknowledging that CISOs have a mountain to climb to do so.

    Ryan Fetterman, senior security strategist at Cisco Foundation AI and Splunk SURGe, his historical position had been to tell people not to get too worked up about AI changing the nature of cyber attacks, because threat actors were typically using such models to recreate the same methodologies favoured by humans, albeit at scale and more efficiently.

    However, he said, this was clearly now changing. He noted in particular the emergence of an AI-powered ransomware PromptLock – which was discovered by ESET researchers at the end of August – although this turned out to be a proof of concept (PoC) developed by engineers at the Tandon School of Engineering at New York University (NYU),

    “Cyber vegetables are important,” said Fetterman. “The reason for that is because the bar has been lowered for attackers using AI to scale their attacks and require less sophistication to do the things that they want to do. That makes it easier to find the low-hanging fruit for things like ransomware.”

    Fetterman detailed an example of a ransomware incident in which the threat actor engaged in vibe-hacking – a nefarious bedfellow to the marginally more benign vibe-coding phenomenon.

    He explained how the attacker used an AI agent to help conduct a full ransomware attack chain from initial target reconnaissance to vulnerability exploitation to execution and encryption. If this wasn’t already bad enough, they were also able to scale this attack chain across a total of 16 victims.

    “I think that is scary because that can obviously scale to more attackers and scale to more victims, and now the targets that may not have been appealing from a financial perspective previously can in aggregate bring more of a return for those attackers, and maybe organisations that would have been lower on the priority list are fair game,” said Fetterman.

    Splunk CISO Michael Fanning told Computer Weekly that nailing the basics was the most important part of any cyber security programme.

    “I think very often we chase these shiny new technologies and capabilities and often they are a solution looking for a problem,” he said. “We  need to think about what are the problems we’re trying to solve.

    “When you learn how to play basketball, you start by learning how to make a layup, how to shoot free throws, how to play defense – and those are some of the hallmarks of a good team, there’s nothing fancy about that,” added Fanning. “The same is true with running cyber security – really nailing the basics in the core domains of cyber security is just an integral part of actually protecting your environment.”

    Fanning acknowledged that it is understandable that some security leaders might give into novelty. However, he added: “Usually when that happens that’s indicative of a lack of strategy for your organisation.”

    Security leaders who have defined their top security initiatives and objectives can better keep their teams focused on what truly matters, and on the right track, and avoid such “pet projects” that serve only to distract and increase risk, said Fanning.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Splunk.conf: Splunk and Cisco showcase unified platform

      September 9, 2025

      Jelly Beans for Grapes: How AI Can Erode Students’ Creativity

      September 8, 2025

      25 insights about what back-to-school season has in store

      September 8, 2025

      US politicians ponder Wimwig cyber intel sharing law

      September 8, 2025

      Head Start Funding Is on Track for Approval. It Still May Not Be Enough.

      September 7, 2025

      4 tips to create an engaging digital syllabus

      September 7, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202466 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202429 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202423 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202518 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views
      Reviews

      Master in Artificial Intelligence (AI) | Udemy Coupons 2025

      September 10, 2025

      Sr Analyst, iOS Developer

      September 10, 2025

      Splunk.conf: Splunk urges users to eat their ‘cyber veggies’

      September 10, 2025

      21 Days to Elite Focus & Leadership | Udemy Coupons 2025

      September 10, 2025

      Field Engineer

      September 10, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Splunk.conf: Splunk urges users to eat their ‘cyber veggies’

      September 10, 2025

      Splunk.conf: Splunk and Cisco showcase unified platform

      September 9, 2025

      Jelly Beans for Grapes: How AI Can Erode Students’ Creativity

      September 8, 2025

      25 insights about what back-to-school season has in store

      September 8, 2025

      US politicians ponder Wimwig cyber intel sharing law

      September 8, 2025
      Latest Videos

      Is Accounting the worst finance career???

      September 7, 2025

      Kickstart Your Digital Marketing Career with NIMS Academy: Learn SEO, Content Creation & More!

      September 6, 2025

      RecruitCRM , Scaler , Amazon |2021, 2022 , 2023 , 2024 jobs

      September 4, 2025

      Career in Advertising #Advertising #creativity #design #media #buyer #planner #marketing #promotion

      September 2, 2025

      Cyber security insights #15/200 by white fortress academy #ethicalhacking

      September 1, 2025
      Latest Jobs

      Sr Analyst, iOS Developer

      September 10, 2025

      Field Engineer

      September 10, 2025

      Area Manager

      September 10, 2025

      Costco Free Sample Representative

      September 10, 2025

      Customer Experience Coordinator

      September 9, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202535 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      ISO 9001:2015 – Quality Management System Internal Auditor | Udemy Coupons 2025

      May 5, 202534 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202522 Views
      Blog

      The Best Jewelry Brands For Creating a Positive First Impression at Work –

      September 9, 2025

      AI Took My Job: Reskill, Adapt, and Thrive in Your Career

      September 5, 2025

      Finding Purpose in Life –

      August 31, 2025

      How Helya Mohammadian Is Leading the Charge for Accessible Intimates with Slick Chicks –

      August 30, 2025

      Here is MsCareerGirl’s compiled, vetted list of all the major career and job websites you should strongly consider registering for, browsing listings and posting your resume.

      August 29, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT