The White House announced six new countries were joining a coalition of international governments signing onto a joint statement on efforts to counter the proliferation and misuse of commercial spyware amid growing threats to government officials in the U.S. and abroad.
In the post-ChatGPT era, nearly every technology company offers some version of artificial intelligence service. But in some companies, the only AI service available is lip service, according to recent Securities and Exchange Commission lawsuits.
Security researchers say they've spotted a hacking campaign with a strong focus in Southeast Asia that could be the work of Chinese state hacking contractor iSoon, the company whose February internal data leak threw a spotlight on a network of private sector companies hacking on behalf of Beijing.
Federal regulators have issued updated guidance about web trackers on patient portals or other health-related websites, saying that collecting and disclosing certain information - such as device IP addresses - does not necessarily pose HIPAA violations, under some circumstances.
European aerospace giant Airbus on Tuesday called off a multibillion-euro plan to acquire a cybersecurity unit of French IT consultancy firm Atos. Share values of cash-strapped Atos fell approximately 20% by the end of the trading day. Airbus' value rose by nearly 1%.
Data breach blast from the past: Data pertaining to 70 million individuals that the ShinyHunters gang claimed were AT&T customers has been leaked via a hacking forum, three years after criminals first offered it for sale. AT&T said the information didn't appear to have been stolen from its systems.
DHS plans to embed AI in its operations and use large language models to comb through massive amounts of data to investigate child sex traffickers and drug smugglers. While pledging to use AI responsibly, DHS plans to move quickly and target other areas such as immigration and disaster services.
Nation-state-led disinformation campaigns that intend to erode public trust are the biggest threat to the upcoming U.K. election, experts told a parliamentary panel on Monday. Incidents of disinformation created with artificial intelligence have already been reported.
Hackers who are possibly members of a criminal group affiliated with numerous ransomware-as-a-service operations are exploiting a directory traversal vulnerability in a Python library that allows unauthenticated remote attackers access to sensitive information from server files.
A data security firm led by a former CA Technologies executive raised $60 million to boost both organic and inorganic expansion around data and compliance. The round will build on the firm's new data hygiene tool as well as its new controls for detecting and tracking model access to sensitive data.
A spokesperson for the International Monetary Fund confirmed in a statement to ISMG on Monday that the global economic organization is investigating a February cyber incident that compromised 11 email accounts, all of which have since been re-secured.
A Mississippi women's health clinic has filed a proposed class action lawsuit against UnitedHealth Group alleging the disruption in claims processing caused by the cyberattack on the company's Change Healthcare unit and the resulting IT outage is threatening to push the practice into bankruptcy.
If software is eating the world, cloud computing is eating infrastructure. Look no further than a push for cloud-hosted alternatives to SCADA systems. Cloud-hosted SCADA presents both opportunities and challenges for OT organizations, said the U.K. National Cyber Security Center.
Amazon Web Services hired Gee Rittenhouse to help organizations protect their data and applications in the cloud. Rittenhouse spent more than two years atop San Jose, California-based security service edge vendor Skyhigh and prior to that, more than three years leading Cisco's cybersecurity unit.
Microsegmentation is a fundamental approach to achieving a mature zero-trust-guided strategy. But before tackling the complex job of microsegmenting infrastructure, IT teams must understand the business context and criticality of the data, said Robert LaMagna-Reiter, CISO at Hudl.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.