Artificial Intelligence September 10, 2024 ChatGPT 4 can exploit 87% of one-day vulnerabilities: Is it really that impressive? 2 min read - After reading about the recent cybersecurity research by Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang, I had questions. While initially impressed that ChatGPT 4 can exploit the vast majority of one-day vulnerabilities, I started thinking about what the…
News September 9, 2024 ONCD releases request for information: Open-source software security 3 min read - Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working on the coding, security measures are often overlooked, increasing the…
Artificial Intelligence September 6, 2024 How cyber criminals are compromising AI software supply chains 3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains…
Intelligence & Analytics September 5, 2024 New report shows ongoing gender pay gap in cybersecurity 3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding…
News August 19, 2024 National Public Data breach publishes private data of 2.9B US citizens 3 min read - Billions of people’s data was published on the dark web around April 8, 2024 — from a single breach of National Public Data. However, many of the victims are still unaware of their exposure because they have yet to receive…
News September 4, 2024 3,000 “ghost accounts” on GitHub spreading malware 3 min read - In the past, cyber criminals directly distributed malware on GitHub using encrypted scripting code or malicious executables. But now threat actors are turning to a new tactic to spread malware: creating ghost accounts. A highly effective malware campaign Check Point…
Artificial Intelligence August 29, 2024 How to embrace Secure by Design principles while adopting AI 5 min read - The rapid rise of generative artificial intelligence (gen AI) technologies has ushered in a transformative era for industries worldwide. Over the past 18 months, enterprises have increasingly integrated gen AI into their operations, leveraging its potential to innovate and streamline…
News September 4, 2024 3,000 “ghost accounts” on GitHub spreading malware 3 min read - In the past, cyber criminals directly distributed malware on GitHub using encrypted scripting code or malicious executables. But now threat actors are turning to a new tactic to spread malware: creating ghost accounts. A highly effective malware campaign Check Point…
Risk Management September 3, 2024 Cost of a data breach: Cost savings with law enforcement involvement 3 min read - For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact…
News August 30, 2024 Warren Buffett’s warning highlights growing risk of cyber insurance losses 3 min read - The United States cyber insurance industry continues to see strong profits, according to Fitch Ratings. Average premium increases, meanwhile, have moderated over the last three years: While 2021 saw a 34% jump in premium pricing and costs rose 15% in…