May 2023

Mastercard collaborates with HealthLock to protect medical data

Mastercard collaborates with HealthLock to protect medical data 23/05/2023 at 15:05 By Industry News Mastercard and HealthLock have partnered to offer millions of Americans help in protecting themselves against medical bill fraud, claim errors and overcharges. Consumers who link their insurance accounts to the HealthLock platform gain the ability to monitor all healthcare claims in […]

React to this headline:

Loading spinner

Mastercard collaborates with HealthLock to protect medical data Read More »

The Rising Threat of Secrets Sprawl and the Need for Action

The Rising Threat of Secrets Sprawl and the Need for Action 23/05/2023 at 15:04 By The most precious asset in today’s information age is the secret safeguarded under lock and key. Regrettably, maintaining secrets has become increasingly challenging, as highlighted by the 2023 State of Secrets Sprawl report, the largest analysis of public GitHub activity.  The report

React to this headline:

Loading spinner

The Rising Threat of Secrets Sprawl and the Need for Action Read More »

New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East

New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East 23/05/2023 at 15:04 By An unknown threat actor has been observed leveraging a malicious Windows kernel driver in attacks likely targeting the Middle East since at least May 2020. Fortinet Fortiguard Labs, which dubbed the artifact WINTAPIX (WinTapix.sys), attributed the malware with low confidence to

React to this headline:

Loading spinner

New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East Read More »

Cutting Through the Noise: What is Zero Trust Security?

Cutting Through the Noise: What is Zero Trust Security? 23/05/2023 at 14:19 By Marie Hattar With proactive steps to move toward Zero Trust, technology leaders can leverage an old, yet new, idea that must become the security norm. The post Cutting Through the Noise: What is Zero Trust Security? appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Cutting Through the Noise: What is Zero Trust Security? Read More »

Simple OSINT techniques to spot AI-fueled disinformation, fake reviews

Simple OSINT techniques to spot AI-fueled disinformation, fake reviews 23/05/2023 at 12:20 By Helga Labus Error messages that ChatGPT and other AI language models generate can be used to uncover disinformation campaigns, hate speech and fake reviews via OSINT collection and analysis, says Nico Dekens, director of intelligence at ShadowDragon. AI-generated content found via Google

React to this headline:

Loading spinner

Simple OSINT techniques to spot AI-fueled disinformation, fake reviews Read More »

Future Exploitation Vector: File Extensions as Top-Level Domains

Future Exploitation Vector: File Extensions as Top-Level Domains 23/05/2023 at 12:01 By In this blog entry, we will examine the security risks related to file extension-related Top-Level Domains (TLDs) while also providing best practices and recommendations on how both individual users and organizations can protect themselves from these hazards. This article is an excerpt from

React to this headline:

Loading spinner

Future Exploitation Vector: File Extensions as Top-Level Domains Read More »

China Bans U.S. Chip Giant Micron, Citing “Serious Cybersecurity Problems”

China Bans U.S. Chip Giant Micron, Citing “Serious Cybersecurity Problems” 23/05/2023 at 10:32 By China has banned U.S. chip maker Micron from selling its products to Chinese companies working on key infrastructure projects, citing national security risks. The development comes nearly two months after the country’s cybersecurity authority initiated a probe in late March 2023 to assess

React to this headline:

Loading spinner

China Bans U.S. Chip Giant Micron, Citing “Serious Cybersecurity Problems” Read More »

7 access management challenges during M&A

7 access management challenges during M&A 23/05/2023 at 07:37 By Help Net Security Integrating an acquired company into a single organization is a daunting task that can take weeks, months, or even years to complete. To have a successful conclusion to the mergers and acquisitions (M&As) process, identity and access management (IAM) teams need time

React to this headline:

Loading spinner

7 access management challenges during M&A Read More »

Gap between OT security assumptions and reality

Gap between OT security assumptions and reality 23/05/2023 at 07:02 By Help Net Security In the fast-evolving landscape of technology and connectivity, ensuring the security of operational technology (OT) systems has become a paramount concern for organizations worldwide. In this Help Net Security video, Daniel Bren, CEO at OTORIO, discusses a significant discrepancy between how

React to this headline:

Loading spinner

Gap between OT security assumptions and reality Read More »

The fragmented nature of API security ownership

The fragmented nature of API security ownership 23/05/2023 at 06:34 By Help Net Security While API security remains a top cybersecurity concern this year, there is still an alarming lack of implementation for most companies, according to Traceable AI. Companies overlook API security Companies are struggling with unchecked API sprawl, lack of clarity on who

React to this headline:

Loading spinner

The fragmented nature of API security ownership Read More »

Online scams target bargain-hunting holiday travelers

Online scams target bargain-hunting holiday travelers 23/05/2023 at 06:01 By Help Net Security 30% of adults have fallen victim or know someone who has fallen victim to an online scam while trying to save money when booking travel, according to McAfee. 34% of those who had money stolen have lost over $1,000 before their trip

React to this headline:

Loading spinner

Online scams target bargain-hunting holiday travelers Read More »

Google Cloud launches new cloud region in Doha

Google Cloud launches new cloud region in Doha 23/05/2023 at 02:18 By Industry News Google Cloud announced the opening of its Doha cloud region at an official launch event attended by ministers from the Qatari Cabinet and executives from leading Qatari businesses, with the cooperation of the Ministry of Communications and Information Technology (MCIT) and

React to this headline:

Loading spinner

Google Cloud launches new cloud region in Doha Read More »

30% of adults have or know someone who fell victim to an online scam

30% of adults have or know someone who fell victim to an online scam 23/05/2023 at 02:18 By With summer approaching, travel safety was analyzed in a report by McAfee Corp. Security leaders should take extra steps to ensure safe work travel. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View

React to this headline:

Loading spinner

30% of adults have or know someone who fell victim to an online scam Read More »

EU Regulators Hit Meta with Record $1.3 Billion Fine for Data Transfer Violations

EU Regulators Hit Meta with Record $1.3 Billion Fine for Data Transfer Violations 23/05/2023 at 02:18 By Facebook’s parent company Meta has been fined a record $1.3 billion by European Union data protection regulators for transferring the personal data of users in the region to the U.S. In a binding decision taken by the European

React to this headline:

Loading spinner

EU Regulators Hit Meta with Record $1.3 Billion Fine for Data Transfer Violations Read More »

Resin and circuitry company cited by OSHA for chemical exposure risks

Resin and circuitry company cited by OSHA for chemical exposure risks 22/05/2023 at 23:03 By The Occupational Safety and Health Administration (OSHA) cited Durez Corp. for chemical exposure and explosion risks of resin and circuitry workers. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Resin and circuitry company cited by OSHA for chemical exposure risks Read More »

72.1% of executives would like to have more data available

72.1% of executives would like to have more data available 22/05/2023 at 22:04 By The use of consumer data was analyzed in a recent survey by Near Intelligence examining ho consumer behavior data is used to make business decisions. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React

React to this headline:

Loading spinner

72.1% of executives would like to have more data available Read More »

Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations

Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations 22/05/2023 at 19:33 By A financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services (AWS) Elastic Compute Cloud (EC2) instances to carry out illicit crypto mining operations. Cloud security company’s Permiso P0 Labs, which first detected the group in November 2021,

React to this headline:

Loading spinner

Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations Read More »

The impact of ChatGPT and AI on the cybersecurity field

The impact of ChatGPT and AI on the cybersecurity field 22/05/2023 at 17:16 By Some organizations view ChatGPT and other AI technologies as a potential cybersecurity tool others say it comes with cybersecurity risk. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

The impact of ChatGPT and AI on the cybersecurity field Read More »

Scroll to Top