Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk https://firewall.firm.in/wp-content/uploads/2024/10/flaws.png Oct 17, 2024Ravie LakshmananVulnerability / Kubernetes A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as CVE-2024-9486 (CVSS score: 9.8), has been addressed in version 0.1.38. The project ...
Read More »Blog
Tenable launches data and AI security posture management for cloud environments – ET CISO
Tenable launches data and AI security posture management for cloud environments – ET CISO https://etimg.etb2bimg.com/thumb/msid-114273648,imgsize-130476,width-1200,height=765,overlay-etciso/corporate/tenable-launches-data-and-ai-security-posture-management-for-cloud-environments.jpg Tenable, the exposure management company, has announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. By extending exposure management capabilities to cloud data and AI resources, Tenable Cloud Security reduces ...
Read More »Artificial intelligence in banking: Transforming the customer experience
Artificial intelligence in banking: Transforming the customer experience One of the most visible impacts of AI in banking is the AI-powered chatbots and virtual assistants which are available 24/7, providing customers with instant support and guidance.
Read More »Legal services firm asks govt to probe Star Health data breach – ET CISO
Legal services firm asks govt to probe Star Health data breach – ET CISO https://etimg.etb2bimg.com/thumb/msid-114237756,imgsize-9320,width-1200,height=765,overlay-etciso/data-breaches/legal-services-firm-asks-govt-to-probe-star-health-data-breach.jpg Software Freedom Law Centre India (SFLCI), a Delhi-based legal services organisation, on Monday wrote to the national cyber agency Indian Computer Emergency Response Team (CERT-In) to initiate a probe into the data breach by Star Health and Allied Insurance, one of the largest health insurers ...
Read More »Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity https://firewall.firm.in/wp-content/uploads/2024/10/hacker.png Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected “threat actors attempting to integrate EDRSilencer in their attacks, repurposing ...
Read More »Casio confirms customer data compromised in ransomware attack – ET CISO
Casio confirms customer data compromised in ransomware attack – ET CISO https://etimg.etb2bimg.com/thumb/msid-114273808,imgsize-92562,width-1200,height=765,overlay-etciso/cybercrime-fraud/casio-confirms-customer-data-compromised-in-ransomware-attack.jpg Japanese electronics giant Casio has confirmed that a recent ransomware attack resulted in the theft of customer data, along with sensitive employee and company information. The breach, which occurred on October 5, 2024, is the latest in a series of high-profile cyberattacks targeting major corporations this year. In ...
Read More »India ranks high in global malware and ransomware incidents, IT Security News, ET CISO
India ranks high in global malware and ransomware incidents, IT Security News, ET CISO Trend Micro recently unveiled its highly anticipated Trend Micro 2024 Midyear Cybersecurity Threat Report outlining India’s heightened cybersecurity risks. With the nation’s digital infrastructure rapidly expanding across critical sectors like Banking, Government, and Manufacturing, India now stands at the forefront of global cybersecurity challenges. The findings ...
Read More »OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf https://firewall.firm.in/wp-content/uploads/2024/10/cyberattac.png Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying ...
Read More »Trump campaign turns to secure hardware after hacking incident – ET CISO
Trump campaign turns to secure hardware after hacking incident – ET CISO https://etimg.etb2bimg.com/thumb/msid-114165352,imgsize-55794,width-1200,height=765,overlay-etciso/ot-security/trump-campaign-turns-to-secure-hardware-after-hacking-incident.jpg Republican presidential candidate Donald Trump’s campaign is now using specialized, encrypted mobile phones and secure laptops in an effort to protect staff following a series of successful Iranian hacks and two attempts to assassinate the former president. The campaign recently purchased a package of these devices from ...
Read More »Apple researchers question AI’s reasoning ability in mathematics, ET CISO
Apple researchers question AI’s reasoning ability in mathematics, ET CISO A team of Apple researchers has questioned the formal reasoning capabilities of large language models (LLMs), particularly in mathematics. They found that LLMs exhibit noticeable variance when responding to different instantiations of the same question. Literature suggests that the reasoning process in LLMs is probabilistic pattern-matching rather than formal reasoning. ...
Read More »