June 2023

Snowflake Expands collaboration with Microsoft to enter the next wave of generative AI

Snowflake Expands collaboration with Microsoft to enter the next wave of generative AI 26/06/2023 at 20:01 By Industry News Snowflake announced an expanded partnership with Microsoft, enabling new product integrations across AI, low code/no code application development, data governance, and more. The two companies will also implement new programs to enhance joint go-to-market strategies and […]

React to this headline:

Loading spinner

Snowflake Expands collaboration with Microsoft to enter the next wave of generative AI Read More »

Fortinet Patches Critical RCE Vulnerability in FortiNAC

Fortinet Patches Critical RCE Vulnerability in FortiNAC 26/06/2023 at 18:36 By Ionut Arghire Fortinet releases patches for a critical FortiNAC vulnerability leading to remote code execution without authentication. The post Fortinet Patches Critical RCE Vulnerability in FortiNAC appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Fortinet Patches Critical RCE Vulnerability in FortiNAC Read More »

Immuta’s integration with Databricks provides security at scale for data and AI workloads

Immuta’s integration with Databricks provides security at scale for data and AI workloads 26/06/2023 at 18:02 By Industry News Immuta has announced key enhancements to its Data Security Platform for Databricks that enable data teams to leverage Immuta’s full platform capabilities, unlocking value from data, reducing costs, and speeding up innovation while maintaining strong data

React to this headline:

Loading spinner

Immuta’s integration with Databricks provides security at scale for data and AI workloads Read More »

New Relic APM 360 gives engineers a shared view of their application health

New Relic APM 360 gives engineers a shared view of their application health 26/06/2023 at 17:36 By Industry News New Relic has launched New Relic APM 360, that goes beyond incident troubleshooting insights for select experts to daily performance, security & development insights for all engineers. APM 360 correlates all essential telemetry data across the

React to this headline:

Loading spinner

New Relic APM 360 gives engineers a shared view of their application health Read More »

52% of reported breaches came through third-party partners

52% of reported breaches came through third-party partners 26/06/2023 at 17:36 By According to a report by ForgeRock, identity theft and fraud remains a top concern for security leaders as it leads to large data breaches. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

52% of reported breaches came through third-party partners Read More »

Regula enhances solution for document verification to help users detect forgery

Regula enhances solution for document verification to help users detect forgery 26/06/2023 at 17:04 By Industry News 49% of organizations around the world had to deal with fake or modified physical identity documents in 2022, as Regula’s survey revealed. With this fraud always on the rise, Regula is reinforcing its solution for document verification with

React to this headline:

Loading spinner

Regula enhances solution for document verification to help users detect forgery Read More »

Pradeo helps MSSPs identify threats with the latest Mobile Threat Defense release

Pradeo helps MSSPs identify threats with the latest Mobile Threat Defense release 26/06/2023 at 16:35 By Industry News While mobile users are increasingly falling victims of cybercriminals, organizations are raising their spending in mobile endpoint detection and response solutions (Mobile EDR). To tackle these new cybersecurity threats, they are turning to their Managed Security Service

React to this headline:

Loading spinner

Pradeo helps MSSPs identify threats with the latest Mobile Threat Defense release Read More »

Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack

Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack 26/06/2023 at 16:16 By An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month to deploy an Apple macOS backdoor called JokerSpy. Elastic Security Labs, which is monitoring the intrusion set under the name REF9134, said the attack led to the

React to this headline:

Loading spinner

Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack Read More »

Databricks acquires MosaicML to make generative AI accessible for every organization

Databricks acquires MosaicML to make generative AI accessible for every organization 26/06/2023 at 16:02 By Industry News Databricks has entered into a definitive agreement to acquire MosaicML, a generative AI platform. Together, Databricks and MosaicML will make generative AI accessible for every organization, enabling them to build, own and secure generative AI models with their

React to this headline:

Loading spinner

Databricks acquires MosaicML to make generative AI accessible for every organization Read More »

British Twitter Hacker Sentenced to Prison in US

British Twitter Hacker Sentenced to Prison in US 26/06/2023 at 15:57 By Ionut Arghire UK national Joseph James O’Connor was sentenced to five years in a US prison for hacking into Twitter accounts and stealing cryptocurrency. The post British Twitter Hacker Sentenced to Prison in US appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

British Twitter Hacker Sentenced to Prison in US Read More »

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS 26/06/2023 at 15:39 By Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And AI tools are no exception. Employees and business leaders alike are flocking to generative

React to this headline:

Loading spinner

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS Read More »

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches 26/06/2023 at 15:16 By Without question, the “human factor” in cybersecurity has become synonymous with phishing attacks, but that perception is a material part of the problem.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Consider the human factor in cyber breaches Read More »

CISA Says Critical Zyxel NAS Vulnerability Exploited in Attacks

CISA Says Critical Zyxel NAS Vulnerability Exploited in Attacks 26/06/2023 at 14:47 By Eduard Kovacs CISA has warned users of Zyxel NAS products that the recently patched critical vulnerability CVE-2023-27992 has been exploited in attacks. The post CISA Says Critical Zyxel NAS Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

CISA Says Critical Zyxel NAS Vulnerability Exploited in Attacks Read More »

Remotely Exploitable DoS Vulnerabilities Patched in BIND

Remotely Exploitable DoS Vulnerabilities Patched in BIND 26/06/2023 at 14:47 By Ionut Arghire The latest BIND updates address three high-severity, remotely exploitable vulnerabilities leading to denial-of-service (DoS). The post Remotely Exploitable DoS Vulnerabilities Patched in BIND appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Remotely Exploitable DoS Vulnerabilities Patched in BIND Read More »

MOVEit compromise affects pension systems, insurers

MOVEit compromise affects pension systems, insurers 26/06/2023 at 14:32 By Helga Labus The compromise of PBI Research and The Berwyn Group’s MOVEit installation has resulted in the theft of data belonging to several pension systems and insurance companies – and millions of their users. PBI + Berwyn Group – a population management provider – was

React to this headline:

Loading spinner

MOVEit compromise affects pension systems, insurers Read More »

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers 26/06/2023 at 14:17 By Microsoft has disclosed that it’s detected a spike in credential-stealing attacks conducted by the Russian state-affiliated hacker group known as Midnight Blizzard. The intrusions, which made use of residential proxy services to obfuscate the source IP address of the attacks, target

React to this headline:

Loading spinner

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers Read More »

Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks

Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks 26/06/2023 at 10:03 By The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in the wild since at least mid-2020, with the hacking crew linked to never-before-seen tradecraft to retain remote access to targets of interest. The findings come

React to this headline:

Loading spinner

Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks Read More »

Scroll to Top