Category: AI in news
Cybersecurity experts faulted UHG for failure to deploy multifactor authentication MFA — a basic enterprise security access control — across Change Healthcare’s servers. UHG acquired Change Healthcare in October 2022. Letter blames inexperienced security leadership Steven Martin, UHG’s chief information security officer, was appointed in June 2023. “He had not worked in a full-time cybersecurity…
Read MoreLive Nation SEC filing confirms “unauthorized activity” in wake of alleged Ticketmaster hack
- by nlqip
Following a cybercrime group’s claims that it stole data from 560 million Ticketmaster customers, the ticket sales and distribution firm’s parent company told the US Securities and Exchange Commission (SEC) on Friday that it had identified unauthorized activity with a cloud partner. “On May 20, 2024, Live Nation Entertainment identified unauthorized activity within a third-party…
Read More‘I am more optimistic than I have ever been for the potential and growth ahead of us and believe these changes will best position us for long-term success,’ says new AWS CEO Matt Garman. Matt Garman is now officially Amazon Web Services’ new CEO, effective Monday. The longtime AWS veteran is hitting the ground running,…
Read MoreAI-generated code promises to reshape cloud-native application development practices, offering unparalleled efficiency gains and fostering innovation at unprecedented levels. However, amidst the allure of newfound technology lies a profound duality—the stark contrast between the benefits of AI-driven software development and the formidable security risks it introduces. As organizations embrace AI to accelerate workflows, they must…
Read MoreAs AWS’ Adam Selipsky departs as CEO, CRN looks at the biggest executive departures and hirings of 2024 so far. From Amazon Web Services’ Adam Selipsky officially stepping down as CEO Monday to the recent hiring of Google Cloud’s former vice president of engineering, AWS is witnessing a major leadership shakeup. After three years of…
Read MoreJun 03, 2024NewsroomSoftware Security / Supply Chain Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that’s designed to drop a remote access trojan (RAT) on compromised systems. The package in question is glup-debugger-log, which targets users of the gulp toolkit by masquerading as a “logger for gulp and gulp…
Read MoreThese Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)
- by nlqip
Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if you’re affected, and if so, what you should do right away to protect your Azure environment from attackers. Tenable Research has…
Read MorePersonal credentials of the demo account of a former employee were obtained and used by the threat actors, specifically, because the account was not behind Okta or Multi-Factor Authentication (MFA), unlike Snowflake’s corporate and production systems, according to Jones. “The incident playing out at Snowflake is due to the same issue we’re seeing across the…
Read MoreAI Will Increase the Quantity—and Quality—of Phishing Scams A piece I coauthored with Fredrik Heiding and Arun Vishwanath in the Harvard Business Review: Summary. Gen AI tools are rapidly making these emails more advanced, harder to spot, and significantly more dangerous. Recent research showed that 60% of participants fell victim to artificial intelligence (AI)-automated phishing,…
Read MoreJun 03, 2024The Hacker NewsCyber Threat Intelligence Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations require a holistic analysis across external data, inbound and outbound threats and network activity. This will enable evaluating the true state of cybersecurity in the enterprise. Cato’s Cyber Threat Research Lab…
Read MoreRecent Posts
- Fake AI video generators infect Windows, macOS with infostealers
- T-Mobile confirms it was hacked in recent wave of telecom breaches
- GitHub projects targeted with malicious commits to frame researcher
- NSO Group used another WhatsApp zero-day after being sued, court docs say
- Ingram Micro’s Sahoo: ‘Don’t React To AI.’ Act On AI’