What risks do advanced AI models pose in the wrong hands?, IT Security News, ET CISO By Alexandra Alper WASHINGTON: The Biden administration is poised to open up a new front in its effort to safeguard U.S. AI from China and Russia with preliminary plans to place guardrails around the most advanced AI models, Reuters reported on Wednesday. Government and ...
Read More »Blog
CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)
CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) https://firewall.firm.in/wp-content/uploads/2024/05/webinar.jpg May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat Hunting is Powered by Generative AI,” where you’ll explore how AI tools ...
Read More »EU asks for more details on X’s content moderation activities, resources – ET CISO
EU asks for more details on X’s content moderation activities, resources – ET CISO https://etimg.etb2bimg.com/thumb/msid-109968526,imgsize-14330,width-1200,height=765,overlay-etciso/grc/eu-asks-for-more-details-on-xs-content-moderation-activities-resources.jpg The European Commission on Wednesday sent Elon Musk-run X a request for information (RFI) under the Digital Services Act (DSA), seeking more details on the company’s content moderation activities and resources, on the risk assessment conducted by it about the implementation of generative AI tools ...
Read More »Dinesh Kamble takes charge as CISO & Head Infosec at RBL Bank
Dinesh Kamble takes charge as CISO & Head Infosec at RBL Bank In his new role at RBL Bank, Kamble will mitigate cyber risks and ensure regulatory compliance. He will be focused on selecting and governing security technologies while fostering a security-conscious culture within the organization, championing employee awareness and best practices.
Read More »A SaaS Security Challenge: Getting Permissions All in One Place
A SaaS Security Challenge: Getting Permissions All in One Place https://firewall.firm.in/wp-content/uploads/2024/05/as.png Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each user’s base permission is determined by their role, while additional permissions may be granted based on tasks ...
Read More »Cisco unveils integrations with Splunk to bolster enterprise security – ET CISO
Cisco unveils integrations with Splunk to bolster enterprise security – ET CISO https://etimg.etb2bimg.com/thumb/msid-109938575,imgsize-78710,width-1200,height=765,overlay-etciso/corporate/cisco-unveils-integrations-with-splunk-to-bolster-enterprise-security.jpg Cisco is integrating the technology of Splunk with the Cisco Extended Detection & Response (XDR) service, among other initiatives, in a bid to bolster enterprise Security Operations Center (SOC). Cisco said its combination with Splunk “is the most comprehensive solution” for threat prevention, detection, investigation and response ...
Read More »Digiyatra CEO denies storing passenger data, IT Security News, ET CISO
Digiyatra CEO denies storing passenger data, IT Security News, ET CISO Digiyatra, the government-promoted app which aims to provide a paperless check-in at airports through facial recognition, has been hit by a controversy. One of its vendors, Dataevolve Solutions has been accused by Andhra Pradesh police of defrauding them of traffic e-challan payments. In fact, last year, the Enforcement Directorate ...
Read More »APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data https://firewall.firm.in/wp-content/uploads/2024/05/ad.png The Iranian state-backed hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of the attack include Western and Middle Eastern NGOs, media organizations, academia, legal services and activists, Google Cloud subsidiary Mandiant said in a report ...
Read More »Dirty stream attack on Android phones – ET CISO
Dirty stream attack on Android phones – ET CISO https://etimg.etb2bimg.com/thumb/msid-109906514,imgsize-61812,width-1200,height=765,overlay-etciso/cybercrime-fraud/dirty-stream-attack-on-android-phones.jpg The “Dirty Stream” attack is a recent security vulnerability discovered by Microsoft that specifically targets Android smartphones. It exploits a flaw in the way apps share data with each other, potentially putting your device and information at risk. Here’s all you need to know: What it is: Imagine an app ...
Read More »Microsoft-OpenAI deal set to dodge formal EU merger probe, IT Security News, ET CISO
Microsoft-OpenAI deal set to dodge formal EU merger probe, IT Security News, ET CISO EU antitrust regulators have concluded that Microsoft’s $13 billion investment into OpenAI is not an acquisition, sources familiar with the matter said on Wednesday, signaling the deal will avoid a formal European probe that could have led to onerous remedies for the U.S. tech giant. EU ...
Read More »