Fri.Oct 25, 2024

article thumbnail

Watermark for LLM-Generated Text

Schneier on Security

Researchers at Google have developed a watermark for LLM-generated text. The basics are pretty obvious: the LLM chooses between tokens partly based on a cryptographic key, and someone with knowledge of the key can detect those choices. What makes this hard is (1) how much text is required for the watermark to work, and (2) how robust the watermark is to post-generation editing.

article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

As cybersecurity matures, the concept of resilience has taken on new dimensions, at least according to Commvault’s CEO, Sanjay Mirchandani. Attending their annual global event series, SHIFT , in London recently, he redefined the future of business resilience in his keynote address and positioned the concept of continuous business—a ground-breaking state of perpetual availability and robustness which revolves around four pivotal elements: 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From Risk Assessment to Action: Improving Your DLP Response

Security Affairs

DLP is key in cybersecurity; a risk assessment identifies data risks, helping turn findings into real-world security improvements. Data loss prevention (DLP) is a cornerstone of any effective cybersecurity strategy. Protecting sensitive data is what cybersecurity is all about. So, how can you conduct a DLP risk assessment? And how can you translate those findings into real-world improvements?

Risk 122
article thumbnail

100 MILLION Americans in UnitedHealth PII Breach

Security Boulevard

Not cute: $UNH’s Change Healthcare unit paid a big ransom—its IT was as weak as a kitten. The post 100 MILLION Americans in UnitedHealth PII Breach appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Change Healthcare data breach impacted over 100 million people

Security Affairs

The Change Healthcare data breach in the February 2024 impacted over 100 million, the largest-ever healthcare data breach in the US. UnitedHealth Group announced that the data breach suffered by Change Healthcare in February 2024 impacted more than 100 million individuals. On February 21, a cyber attack disrupted IT operation of the healthcare organization, more than 100 Change Healthcare applications were impacted.

article thumbnail

CISOs Should Be Directing IAM Strategy — Here’s Why 

Security Boulevard

By placing IAM strategy and enforcement under the CISO’s purview, enterprises can ensure that it is treated as a critical component of the overall security strategy. The post CISOs Should Be Directing IAM Strategy — Here’s Why appeared first on Security Boulevard.

CISO 124

LifeWorks

More Trending

article thumbnail

U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-20481 Cisco ASA and FTD Denial-of-Service Vulnerability CVE-2024-37383 RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability This week, Cisco addressed multiple vulner

VPN 112
article thumbnail

EDR Dependency: Ensuring Uninterrupted and Comprehensive Security Coverage

Security Boulevard

By merging EDRs with defense-in-depth technologies such as AMTD, businesses can detect and respond to known threats, as well as those lurking in the cracks. The post EDR Dependency: Ensuring Uninterrupted and Comprehensive Security Coverage appeared first on Security Boulevard.

article thumbnail

Change Healthcare Cyberattack Exposed Data of Over 100 Million People

Tech Republic Security

Nearly one-third of Americans may have been affected by the ransomware attack, which has been attributed to the BlackCat gang.

article thumbnail

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security

The Hacker News

Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the "most advanced security architecture ever deployed for cloud AI compute at scale.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Enter the World of Ethical Hacking with Confidence

Tech Republic Security

This $44.99 bundle gives you 92 hours of training in penetration testing, network security, and much more.

article thumbnail

CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities

The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. "The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture," CERT-UA said. "These emails contain attachments in the form of Remote Desktop Protocol ('.

article thumbnail

ReliaQuest Uncovers New Black Basta Social Engineering Technique

Digital Shadows

What Happened? In October 2024, ReliaQuest responded to an alert for Impacket activity. During the investigation, we discovered a wider trend: a campaign of escalated social engineering tactics originally associated with the ransomware group “Black Basta.” Their previous approach involved overwhelming users with email spam, prompting them to create a legitimate help-desk ticket to resolve the issue.

article thumbnail

Researchers Discover Command Injection Flaw in Wi-Fi Alliance's Test Suite

The Hacker News

A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers.

135
135
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

AI scams have infiltrated the knitting and crochet world - why it matters for everyone

Zero Day

Using AI, scammers are creating frustrating - and expensive - problems for makers. Here's how to spot AI-generated patterns - and why anyone who relies on downloaded instructions should pay attention.

Scams 128
article thumbnail

Eliminating AI Deepfake Threats: Is Your Identity Security AI-Proof?

The Hacker News

Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to a potent weapon in the hands of bad actors. Today, AI-based attacks are not just theoretical threats—they're happening across industries and outpacing traditional defense mechanisms. The solution, however, is not futuristic.

article thumbnail

I wrote half this article on Apple Watch, thanks to this under-the-radar iOS 18 feature

Zero Day

Here's how to transform your writing workflow and turn your Apple Watch into a productivity powerhouse.

128
128
article thumbnail

SEC Charges 4 Companies Over Misleading SolarWinds Cyberattack Disclosures

The Hacker News

The U.S. Securities and Exchange Commission (SEC) has charged four current and former public companies for making "materially misleading disclosures" related to the large-scale cyber attack that stemmed from the hack of SolarWinds in 2020.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Irish Data Protection Commission fined LinkedIn €310M for GDPR infringement

Security Affairs

Irish Data Protection Commission fined LinkedIn €310M for violating user privacy by using behavioral data analysis for targeted advertising. Irish Data Protection Commission fined LinkedIn €310M after finding its use of behavioral data for targeted ads violated privacy laws, requiring compliance changes. The DPC’s inquiry was launched following an initial complaint to the French Data Protection Authority. “The inquiry examined LinkedIn’s processing of personal data for the purposes o

article thumbnail

SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection

Security Boulevard

The number of cybersecurity incidents has doubled since the pandemic and its costing organizations exorbitantly heavy tolls in direct and indirect losses, according to the International Monetary Fund of the United Nations. Close to a million companies are getting impacted by targeted cyberattacks each year. The hasty implementation of the hybrid work model overnight blurred.

Risk 121
article thumbnail

I wore the new Snap Spectacles, and the AR glasses felt like the future

Zero Day

A world where your glasses seamlessly blend digital artifacts over reality may not be far off. Here's how my demo went.

116
116
article thumbnail

The Three Pillars of Shift-Left API Security

Security Boulevard

When it comes to proactive API security, there are three critical pillars: API Discovery, API Security Testing, and API Oversight. The post The Three Pillars of Shift-Left API Security appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

New Qilin Ransomware Variant Spotted by Cybersecurity Researchers

Heimadal Security

A new version of the Qilin ransomware was discovered by cybersecurity researchers. The new version comes with increased sophistication and tactics to evade detection. The new variant is being tracked as Qilin.B by researchers at Halcyon and it notably supports AES-25-CTR encryption systems with AWSNI capabilities. Furthermore, encryption keys are protected using RSA-4096 with OAEP […] The post New Qilin Ransomware Variant Spotted by Cybersecurity Researchers appeared first on Heimdal Secur

article thumbnail

AWS Seizes Domains Used by Russian Threat Group APT29

Security Boulevard

Cloud computing giant AWS, tipped off by Ukrainian security experts, seized domains that were being used by Russian threat group APT29 to send phishing emails to government officials and enterprises that contained malicious files that would grants the hackers access to the victims' systems. The post AWS Seizes Domains Used by Russian Threat Group APT29 appeared first on Security Boulevard.

Phishing 121
article thumbnail

The tablet I recommend to creatives is not an iPad (but its battery life is just as good)

Zero Day

The Asus ProArt PZ13 is a high-performing tablet/laptop hybrid with a gorgeous 3K OLED screen and a battery that lasts way longer than you'd expect.

110
110
article thumbnail

Sophos Acquires Dell’s Secureworks for $859 Million

Security Boulevard

British security provider Sophos plans to acquire Dell subsidiary Secureworks in an all-cash transaction valued at approximately $859 million. The deal, announced in a joint release on Monday, will grant Sophos control over Secureworks’ Taegis Extended Detection and Response (XDR) platform, a platform aimed at enhancing threat detection for medium to large enterprises.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

7 essential password rules to follow in 2024, according to security experts

Zero Day

What makes a password strong now? How long should it be? How often should you change it? Here's what the cybersecurity pros at NIST recommend - some of which may surprise you.

Passwords 109
article thumbnail

Why Transparency and Trust Should Underscore DevOps

SecureWorld News

The dynamic and ever-evolving world of DevOps requires businesses to deliver high-quality software, under pressure, at an accelerated pace. The combination of complex software development and IT operations has emerged as a powerful methodology to help businesses scale sustainably and securely. As cybersecurity concerns continue to grow, many organizations are also now embracing DevSecOps, integrating many security practices throughout the DevOps process.

article thumbnail

How the Roku Ultra revived my old $100 TV and became a streaming favorite

Zero Day

Looking for a fast, reliable streaming device that's easy to use with any smartphone? The Roku Ultra is simplicity perfected.

105
105
article thumbnail

UnitedHealth: 100 Million Individuals Affected by the Change Healthcare Data Breach

Heimadal Security

UnitedHealth confirms for the first time that over 100 million people had their personal information and healthcare records stolen during the Change Healthcare ransomware attack. Change Healthcare initially published a data breach notification warning in June, stating that a ransomware attack in February exposed a ‘substantial quantity of data’ for a significant proportion of the […] The post UnitedHealth: 100 Million Individuals Affected by the Change Healthcare Data Breach appeared first

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!