Security News

7 free cyber threat maps showing attack intensity and frequency
2023-11-07 06:00

Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on digital threats, showcasing the intensity and frequency of attacks as they happen.

Top 50 Cybersecurity Threats
2023-10-30 16:00

TechRepublic Premium Hiring Kit: Cloud Engineer Regardless of what business or what industry you are in, the potential benefits of cloud computing and cloud computing services are self-evident. With so many businesses flooding .... TechRepublic Premium Hiring Kit: Data Architect To make their best decisions, businesses need the best actionable information.

The CISO Report: Emerging Trends, Threats, and Strategies for Security Leaders
2023-10-30 16:00

TechRepublic Premium Hiring Kit: Cloud Engineer Regardless of what business or what industry you are in, the potential benefits of cloud computing and cloud computing services are self-evident. With so many businesses flooding .... TechRepublic Premium Hiring Kit: Data Architect To make their best decisions, businesses need the best actionable information.

The PEAK Threat Hunting Framework
2023-10-30 16:00

TechRepublic Premium Hiring Kit: Cloud Engineer Regardless of what business or what industry you are in, the potential benefits of cloud computing and cloud computing services are self-evident. With so many businesses flooding .... TechRepublic Premium Hiring Kit: Data Architect To make their best decisions, businesses need the best actionable information.

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date
2023-10-30 15:31

Microsoft exposes Octo Tempest, an English-speaking threat actor that runs extortion, encryption and destruction campaigns at a wide variety of industries. A new report from Microsoft Incident Response and Microsoft Threat Intelligence teams exposed the activities and constant evolution of a financially oriented threat actor named Octo Tempest, who deploys advanced social engineering techniques to target companies, steal data and run ransomware campaigns.

Google expands bug bounty program to cover AI-related threats
2023-10-30 09:12

Google has expanded its bug bounty program, aka Vulnerability Rewards Program, to cover threats that could arise from Google's generative AI systems. Following the voluntary commitment to the Biden-⁠Harris Administration to develop responsible AI and manage its risks, Google has added AI-related risks to its bug bounty program, which gives recognition and compensation to ethical hackers who successfully find and disclose vulnerabilities in Google's systems.

AI threat landscape: Model theft and inference attacks emerge as top concerns
2023-10-30 05:30

Enterprises will invest nearly $16 billion worldwide on GenAI solutions in 2023, according to IDC. In this Help Net Security interview, Guy Guzner, CEO at Savvy, discusses the challenges and opportunities presented by in-house AI models, the security landscape surrounding them, and the future of AI cybersecurity. Organizations developing in-house AI models have a distinct advantage when it comes to critical security concerns.

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats
2023-10-27 10:54

Google has announced that it's expanding its Vulnerability Rewards Program (VRP) to reward researchers for finding attack scenarios tailored to generative artificial intelligence (AI) systems in...

IoT security threats highlight the need for zero trust principles
2023-10-27 04:30

ThreatLabz focused on understanding IoT device activity and attributes via device fingerprinting and analyzing the IoT malware threat landscape. By adopting a zero trust architecture, organizations can gain visibility into IoT device traffic and minimize IoT security risks.

Forget the outside hacker, the bigger threat is inside by the coffee machine
2023-10-26 20:15

Kettle In this week's Kettle the topic is one that's been much in the news this week - the much-underrated insider threat issue. Time and again the most effective thieves are already inside the building and using their corporate-issued credentials.