Security News > 2023 > April > Week in review: 3CX supply chain attack, ChatGPT data leak
Microsoft unveils AI-powered Security Copilot analysis toolMicrosoft has unveiled Security Copilot, an AI-powered analysis tool that aims to simplify, augment and accelerate security operations professionals' work.
Prioritizing data security amid workforce disruptionsIn this Help Net Security video, Chris Wey, President of Data Modernization at Rocket Software, discusses the risks organizations face and the steps they can take to mitigate disruption.
Overcoming obstacles to introduce zero-trust security in established systemsIn this Help Net Security interview, Michal Cizek, CEO at GoodAccess, discusses the crucial balance between leveraging distributed resources and maintaining top-notch security measures.
Running a security program before your first security hireIn this Help Net Security video, Matt Spitz, Head of Engineering at Vanta, talks about pragmatic security and illustrates what a small company with limited resources needs to do to lay the groundwork for effective protection.
What the food and building industry can teach us about securing embedded systemsCurrently the SVP of Security Technology and Innovation at Cybellum, the Left to Our Own Devices podcast invited Adam Boulton to share his experience and his tips on building a product security strategy.
The best defense against cyber threats for lean security teamsThe National Institute of Standards and Technology Cyber Security Framework is one of the most respected and widely used standards in the world.
News URL
https://www.helpnetsecurity.com/2023/04/02/week-in-review-3cx-supply-chain-attack-chatgpt-data-leak/
Related news
- Thousands of orgs at risk of knowledge base data leaks via ServiceNow misconfigurations (source)
- A data leak and a data breach (source)
- Israel’s Pager Attacks and Supply Chain Vulnerabilities (source)
- 5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- Pokemon dev Game Freak confirms breach after stolen data leaks online (source)
- Troubled US insurance giant hit by extortion after data leak (source)
- Interbank confirms data breach following failed extortion, data leak (source)
- LottieFiles hit in npm supply chain attack targeting users' crypto (source)