Application security teams from Fortune 500 companies are already using Noma’s life cycle platform, which offers organizations data and AI supply chain security, AI security posture management, and AI threat detection and response. Go to Source Author: Dark Reading Staff
Category Archives: Uncategorized
Knee-jerk reactions to major vendor outages could do more harm than good. Go to Source Author: Vishaal "V8" Hariprasad
On the heels of a Chinese APT eavesdropping on phone calls made by Trump and Harris campaign staffers, Beijing says foreign nations have mounted an extensive seafaring espionage effort. Go to Source Author: Tara Seals, Managing Editor, News, Dark Reading
In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as “the new perimeter”, the identity stands between safe data management and potential breaches. However, a new report reveals how enterprises are often unaware of how their identities are being used across various platforms. This leaves them […]
A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The vulnerability, tracked as CVE-2024-50550 (CVSS score: 8.1), has been addressed in version 6.5.2 of the plugin. “The plugin suffers from an unauthenticated privilege escalation vulnerability […]
Despite the absence of laws specifically covering AI-based attacks, regulators can use existing rules around fraud and deceptive business practices. Go to Source Author: Stephen Lawton, Contributing Writer
The company’s data loss prevention platform helps customers identify and classify data across SaaS and GenAI applications, endpoints, and emails. Go to Source Author: Dark Reading Staff
The National Security Memorandum on Artificial Intelligence tasks various federal agencies with securing the AI supply chain from potential cyberattacks and disseminating timely threat information about such attacks. Go to Source Author: Jennifer Lawinski, Contributing Writer
The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering operation. Go to Source Author: Jai Vijayan, Contributing Writer
