Your team is in charge of identifying and procuring new software for your firm, so you check out the options in the marketplace, read reviews, and test the software. But how do you know it’s secure? Not a day goes by that there isn’t an incident reported that reminds us that we’re only one vulnerability […]
Author Archives: Onsite Computing, Inc.
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts. Fortunately, plenty of great conferences are coming up in the months ahead. […]
Despite the absence of laws specifically covering AI-based attacks, regulators can use existing rules around fraud and deceptive business practices. Go to Source Author: Stephen Lawton, Contributing Writer
The company’s data loss prevention platform helps customers identify and classify data across SaaS and GenAI applications, endpoints, and emails. Go to Source Author: Dark Reading Staff
The National Security Memorandum on Artificial Intelligence tasks various federal agencies with securing the AI supply chain from potential cyberattacks and disseminating timely threat information about such attacks. Go to Source Author: Jennifer Lawinski, Contributing Writer
Interbank, one of Peru’s leading financial institutions, has confirmed a data breach after a threat actor who hacked into its systems leaked stolen data online. […] Go to Source Author: Sergiu Gatlan
The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering operation. Go to Source Author: Jai Vijayan, Contributing Writer
Law enforcement agencies from six countries, including the US, dealt a major blow to the command-and-control infrastructure used by RedLine and META, two of the most popular infostealers in the cybercriminal underground. The operation, coordinated through Eurojust, resulted in the shutdown of servers, the extraction of a customer database, the indictment of a suspected developer, […]
In a vengeful move against the happiest place on Earth, the former employee allegedly used his old credentials to make potentially deadly changes. Go to Source Author: Dark Reading Staff
