Month: June 2024
To maintain their growing stature and evolving role, CSOs/CISOs “must scale their mandate in the face of increasingly accelerated disruptive technological changes” from AI and cloud transformations, greater customer trust expectations, and a threat landscape that continues to intensify, SAP’s Lange says. Adapting to the velocity of change and providing a consistent defensible risk posture…
Read MoreAnalysts point out that further efforts to block them could disrupt critical services for US enterprises. “The crackdown on Chinese telecom firms may impact the efficiency of US enterprises’ data management and global connectivity by limiting competitive options and increasing transition costs,” said Prabhu Ram, head of the Industry Intelligence Group at CyberMedia Research. “Enterprises…
Read MoreA CISO presented with a key analytic shortcoming during an intrusion event may be more likely to overlook data quality or ethical issues in a new machine learning product they think would prevent similar incidents going forward. Or a positive support experience with an insurer during a crisis might perversely incentivize a too-comfortable relationship with…
Read MoreJun 25, 2024NewsroomNational Security / Wikileak WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five years in a maximum security prison at Belmarsh for what was described by the U.S. government as the “largest compromises of classified information in the history” of the country.…
Read MoreJun 25, 2024NewsroomWordPress / Web Security Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with the aim of performing arbitrary actions. “The injected malware attempts to create a new administrative user account and then sends those details back to the attacker-controlled server,” Wordfence security…
Read MoreJun 25, 2024NewsroomCyber Crime / Financial Fraud Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in a series of computer intrusions that caused over $71 million in losses to companies. The defendants, Ta Van Tai (aka Quynh Hoa and Bich Thuy), Nguyen Viet Quoc…
Read MoreCISA is warning that its Chemical Security Assessment Tool (CSAT) environment was breached in January after hackers deployed a webshell on its Ivanti device, potentially exposing sensitive security assessments and plans. CSAT is an online portal that is used by facilities to report their possession of chemicals that could be used for terrorism to determine…
Read MoreThe shift to digital platforms has led to a surge in identity theft fueled by cyber-attacks. Cybercriminals use AI to enhance these threats, employing deepfakes and AI-powered password cracking. Data breaches are on the rise, with the average cost reaching $4.45 million in 2023. Cybercriminals are increasingly targeting digital account openings and consumer identity credentials,…
Read MoreGoogle is testing a new feature called “Digital Credential API” for Chrome on Android that allows websites to securely request identity information, such as driver’s licenses and passports, stored in mobile wallets. According to Google’s official documentation, the Identity Credential APIs provide an interface to a secure store that holds identity documents. These documents can be…
Read MoreA top Nvidia partner says the hiring of Howard Wright—a former NBA player—as Nvidia’s vice president of startup ecosystem is a ‘byproduct of the amount of well-funded [generative AI] startups’ entering the space and reflects the importance of those companies to the AI chip giant. Nvidia has hired Amazon Web Services executive and former NBA…
Read MoreRecent Posts
- Safeguarding Healthcare Organizations from IoMT Risks
- Broadcom’s VMware Issues ‘Top of Mind’ For Partners, Nutanix Channel Chief Says
- Microsoft just killed the Windows 10 Beta Channel again
- Fraud network uses 4,700 fake shopping sites to steal credit cards
- CISA warns of more Palo Alto Networks bugs exploited in attacks