News

major cyber attack global international cybersecurity
Tech Spotlight   >   IT Leadership [Network World]   >   IT leader considers an abstract IoT network

Abstract Artificial intelligence. Technology web background. Virtual concept

Cisco spotlights generative AI in security, collaboration

Cisco Security Cloud and Webex will sport new features supported by its home-grown generative AI.

hybrid cloud hurdles

Sysdig adds “end-to-end” detection and response to CNAPP

Cloud security vendor says consolidation will help customers detect threats across workloads, identities, cloud services, and third-party applications.

team / teamwork / collaboration / communication / discussion / meeting

New tool enables team collaboration on security case management

With Cases, security teams can collaborate on security incidents to manage anomalies and effect remediation.

Android mobile phone code

Over 60,000 Android apps infected with adware-pushing malware

While currently used to push adware, the campaign can redirect users to other types of malware, such as banking Trojans, to steal credentials and financial information or ransomware.

VMware: Why CISOs Are Looking to Lateral Security to Mitigate Ransomware

Traditional malware increasingly takes advantage of ChatGPT for attacks

As exploits against vulnerabilities increase overall, Palo Alto Networks' research unit has observed a jump in attempts to mimic ChatGPT through squatting domains.

quantum computing digital communication network security

ChatGPT creates mutating malware that evades detection by EDR

Mutating, or polymorphic, malware can be built using the ChatGPT API at runtime to effect advanced attacks that can evade endpoint detections and response (EDR) applications.

leadership / growth / ascending stairway / career rising

Only one in 10 CISOs today are board-ready, study says

A report from cybersecurity firm IANS finds that more than half of public companies lack even one qualified director with cybersecurity expertise.

cloud security / data protection / encryption / security transition

Lacework’s new CIEM uses ML to fish out high-risk identities

The new CIEM will merge with existing threat detection capabilities to consolidate Lacework’s cloud security offering.

binary code displayed across an artificial face

OWASP lists 10 most critical large language model vulnerabilities

The list highlights the impact and prevalence of the 10 most critical vulnerabilities found in artificial intelligence applications based on LLMs.

Toyota Concept-i

Cloud misconfiguration causes massive data breach at Toyota Motor

Vehicle data and customer information were exposed for over eight years due to a cloud misconfiguration at Toyota Motor that impacted over 260,000 customers.

8 code driven security

Clop ransomware gang exploits the MOVEit Transfer vulnerability to steal data

At least one organization, UK payroll provider Zellis, has confirmed a breach via the MOVEit utility.

Bitcoin symbol on the ground surrounded by crime scene tape and forensic evidence markers.

Atomic Wallet hack leads to at least $35M in stolen crypto assets

The biggest victim of the cryptocurrency hack on Atomic Wallet was an individual who reportedly lost $7.95 million in Tether. 

digital ball hand prediction

SAFE Security claims to predict data breaches with new generative AI offering

SAFE Security’s Cyber Risk Cloud of Clouds generates likelihoods for different risk scenarios based on an organization’s cybersecurity posture.

woman in shadow gender equality leader reflection business executive by artem gavrysh unsplash

CISOs, IT lack confidence in executives’ cyber-defense knowledge

Cybercriminals target senior executives, but IT security professionals say these executives are unprepared to defend their devices, software, and home network.

man concerned artificial intelligence ai sign

Governments worldwide grapple with regulation to rein in AI dangers

As generative AI revolutionizes tech, governments around the world are trying to come up with regulations that encourage its benefits while minimizing risks such as bias and disinformation.

Two people review information on a tablet in an office workspace.

Federal cyber incidents reveal challenges of implementing US National Cybersecurity Strategy

As federal government cybersecurity incidents continue to mount, the Biden administration's National Cybersecurity Strategy should help, although experts say implementing it won't be easy.

angry face emoji on mobile phone

Russia points finger at US for iPhone exploit campaign that also hit Kaspersky Lab

The Operation Triangulation surveillance campaign infects Apple iPhones without the need for user action and is difficult to detect.

green tree python

Attackers use Python compiled bytecode to evade detection

Newly discovered campaign takes advantage of the fact that most vulnerability scanning tools don't read compiled open-source software.

Load More