Advertisement

major cyber attack global international cybersecurity

Clop extortion gang gives MOVEit exploit victims one week to reach out

At least 20 organizations have been compromised by Clop's MOVEit exploit, according to new research.


Tech Spotlight   >   IT Leadership [Network World]   >   IT leader considers an abstract IoT network

Network Perception wants to give more visibility into IoT

Operational tech visibility and compliance vendor Network Perception has upgraded its capabilities, adding faster and more detailed analysis of OT networks.


Abstract Artificial intelligence. Technology web background. Virtual concept

Cisco spotlights generative AI in security, collaboration

Cisco Security Cloud and Webex will sport new features supported by its home-grown generative AI.


Advertisement

hybrid cloud hurdles

Sysdig adds “end-to-end” detection and response to CNAPP

Cloud security vendor says consolidation will help customers detect threats across workloads, identities, cloud services, and third-party applications.


team / teamwork / collaboration / communication / discussion / meeting

New tool enables team collaboration on security case management

With Cases, security teams can collaborate on security incidents to manage anomalies and effect remediation.


Android mobile phone code

Over 60,000 Android apps infected with adware-pushing malware

While currently used to push adware, the campaign can redirect users to other types of malware, such as banking Trojans, to steal credentials and financial information or ransomware.


software supply chain security shutterstock 1840707055

10 security tool categories needed to shore up software supply chain security

Software supply chain security is advancing rapidly and if CISOs are only focusing on SCA and SBOM they could only be getting a partial solution to the problem. CSO offers a starter checklist for planning the security solution stack.


VMware: Why CISOs Are Looking to Lateral Security to Mitigate Ransomware

Traditional malware increasingly takes advantage of ChatGPT for attacks

As exploits against vulnerabilities increase overall, Palo Alto Networks' research unit has observed a jump in attempts to mimic ChatGPT through squatting domains.


quantum computing digital communication network security

ChatGPT creates mutating malware that evades detection by EDR

Mutating, or polymorphic, malware can be built using the ChatGPT API at runtime to effect advanced attacks that can evade endpoint detections and response (EDR) applications.


leadership / growth / ascending stairway / career rising

Only one in 10 CISOs today are board-ready, study says

A report from cybersecurity firm IANS finds that more than half of public companies lack even one qualified director with cybersecurity expertise.


Advertisement

cloud security / data protection / encryption / security transition

Lacework’s new CIEM uses ML to fish out high-risk identities

The new CIEM will merge with existing threat detection capabilities to consolidate Lacework’s cloud security offering.


binary code displayed across an artificial face

OWASP lists 10 most critical large language model vulnerabilities

The list highlights the impact and prevalence of the 10 most critical vulnerabilities found in artificial intelligence applications based on LLMs.


Toyota Concept-i

Cloud misconfiguration causes massive data breach at Toyota Motor

Vehicle data and customer information were exposed for over eight years due to a cloud misconfiguration at Toyota Motor that impacted over 260,000 customers.


chatbot_ChatGPT_AI_artificial intelligence_bot_assistant_shutterstock 1901618698

Department of Defense AI principles have a place in the CISO’s playbook

The American defense establishment has put in place some very useful guidelines that CISOs can easily translate and incorporate into their own policies on handling artificial intelligence.


change management in digital transformation internet of things iot and new technology big data and

Shadow IT is increasing and so are the associated security risks

Shadow IT — tech brought into an organization without the security team’s knowledge — continues to be a threat. Managing visibility through increased vigilance and employee education can help mitigate its dangers.