Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware

Source

Why run your own evil infrastructure when Big Tech offers robust tools hosted at trusted URLs? Black Hat State-sponsored cyber spies and criminals are increasingly using legitimate cloud services to attack their victims, according to Symantec's threat hunters who have spotted three such operations over recent months, plus new …

Cybercrime Rapper Sues Bank over Fraud Investigation

Source

A partial selfie posted by Punchmade Dev to his Twitter account. Yes, that is a functioning handheld card skimming device, encrusted in diamonds. Underneath that are more medallions, including a diamond-studded bitcoin and payment card. In January, KrebsOnSecurity wrote about rapper Punchmade Dev, whose music videos sing the praises …

Level up your Kubernetes security with the CIS GKE Benchmarks

Source

Compliance efforts can feel like a challenging endeavor in most organizations. Engineering teams routinely don’t understand how often-confusing requirements will actually make the organization more secure. Sometimes, even the words that define compliance requirements can be hard to comprehend. The entire exercise can feel overwhelming, like being on …

Fighting AI fire with AI fire

Source

Palo Alto Networks reveals how AI can be harnessed to strengthen cyber security defenses David Gordon Sponsored Post Hackers and cyber criminals are busy finding new ways of using AI to launch attacks on businesses and organizations often unprepared to deal with the speed, scale and sophistication of the …

Network perimeter security protections for generative AI

Source

Generative AI–based applications have grown in popularity in the last couple of years. Applications built with large language models (LLMs) have the potential to increase the value companies bring to their customers. In this blog post, we dive deep into network perimeter protection for generative AI applications. We …

Problems with Georgia’s Voter Registration Portal

Source

It’s possible to cancel other people’s voter registration: On Friday, four days after Georgia Democrats began warning that bad actors could abuse the state’s new online portal for canceling voter registrations, the Secretary of State’s Office acknowledged to ProPublica that it had identified multiple such …

NHS IT firm faces £6m fine over medical records hack

Source

Watchdog provisionally finds Advanced failed to act to protect data of 82,946 after ransomware attack in England A software provider faces being fined more than £6m over a 2022 ransomware attack that disrupted NHS and social care services in England, the data protection regulator has announced. The Information …

Students scramble after security breach wipes 13,000 devices

Source

Enlarge (credit: Getty Images) Students in Singapore are scrambling after a security breach wiped notes and all other data from school-issued iPads and Chromebooks running the mobile device management app Mobile Guardian. According to news reports, the mass wiping came as a shock to multiple students in Singapore, where …

Spring 2024 SOC 2 report now available in Japanese, Korean, and Spanish

Source

Japanese | Korean | Spanish At Amazon Web Services (AWS), we continue to listen to our customers, regulators, and stakeholders to understand their needs regarding audit, assurance, certification, and attestation programs. We are pleased to announce that the AWS System and Organization Controls (SOC) 2 report is now available in Japanese …

Join Google Cloud Security Summit 2024 for a masterclass in modernizing security

Source

As your organization works to strengthen your security program, two complementary initiatives can help make a major impact: taking advantage of secure cloud platforms, and integrating dynamic intelligence and security operations. We’re emphasizing both of these in the dual-track agenda at our annual Google Cloud Security Summit on …

« newer articles | page 23 | older articles »