Security Bloggers Network
OpenAI’s GDPR Travails Demonstrate Need for Data Security-by-Design
After several weeks of incredible growth, OpenAI has come in for a bumpy ride of late. First it revealed details of a data breach exposing a significant number of ChatGPT subscribers. Then ...
The Week in Security: Social engineering-attacks up with the rise of AI tools, Genesis Market seized
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...
Criminal Marketplace Disrupted in International Cyber Operation
The Justice Department announced today a coordinated international operation against Genesis Market, a criminal online marketplace that advertised and sold packages of account access credentials – such as usernames and passwords for ...
6 Keys to Asset Protection for High-Net-Worth Individuals
Cybercriminals are using new and inventive strategies to target the personal assets of high-net-worth individuals. In the modern age, criminals can appropriate your assets and disrupt your personal privacy without ever stepping ...
Why the Largest Cybersecurity Gap is the Application Environment
In today’s world, where almost everything is connected to the internet, cybersecurity is a top priority for businesses and individuals alike. Cyber threats are becoming more sophisticated, more coordinated, and more intelligent, ...
New National Cybersecurity Strategy Will Require Compliance, Collaboration
The Biden administration’s recently released National Cybersecurity Strategy goes beyond the executive order it issued in 2021, which defined security measures any organization doing business with the federal government must follow. As ...
What Legacy and Bundled Cybersecurity Tools Miss in Large Network Environments
The main challenge many of the cybersecurity products on the market today struggle to overcome is the difficulty of monitoring multi-cloud environments. Many are only capable of handling pieces of one environment ...
Cyberattacks 2022: Phishing, Ransomware & Data Breach Statistics
Cyberattacks had yet another record-breaking year in 2022. Here's some statistics and trends on phishing, ransomware, and data breaches to be aware of ...
USENIX Security ’22 -Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang – ‘On the Security Risks of AutoML’
Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Security ’22 Conference content on the organization’s’ YouTube channel. Permalink ...
With Twitter code in the wild, DevSecOps doubts surface
Elon Musk’s remaining staff have open-sourced Twitter. Or, at least, they’ve put some of the code onto GitHub ...