Advertisement · 728 × 90

Posts by news

Preview
AI-generated Slopoly malware used in Interlock ransomware attack A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack.

A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack.

4 weeks ago 6 2 0 0
Critical Alert: Cisco SD-WAN Zero-Day (CVE-2026-20127) Under Active Exploitation CISA has issued an emergency directive regarding a critical Cisco SD-WAN zero-day exploited in the wild since 2023. Here is what you need to patch.

obfuscated.site/blog/cisco-s...

1 month ago 1 0 0 0
Preview
AI in Cybersecurity: Top Companies Transforming Cyber Defense Discover how industry-leading cybersecurity companies like Microsoft, CrowdStrike, and SentinelOne use AI and machine learning to enhance threat detection, streamline security operations, and protect ...

Check out my latest post where I explore which companies in cyber are best utilizing AI for defensive security posture management.

11 months ago 2 0 0 0
Preview
Gravy Analytics Breach: How FTC Compliance Mandates Foreshadowed a Privacy Disaster Discover how the Gravy Analytics data breach highlights the critical intersection of compliance and privacy, and where it all went wrong.

🚨 Gravy Analytics Breach: A Privacy Wake-Up Call 🚨

The FTC warned about location data risks, and now it's reality. A breach exposed sensitive data from popular apps like Tinder, MyFitnessPal, and more. IT pros, it's time to tighten data security! #Cybersecurity #Privacy #GravyAnalytics #DataBreach

1 year ago 4 0 0 0
Preview
U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns

1 year ago 6 2 0 0
Preview
EO 14117 and Cybersecurity: Navigating Data Compliance Mandates Learn how EO 14117 impacts sensitive data protection, the businesses most affected, and the critical role of security and compliance professionals in safeguarding data against foreign threats.

What Is Executive Order 14117 and How Does It Impact Data Security Across Industries in the US?

Check out my latest post to see if your business is impacted by the executive order that takes effect in Q1 2025.

#cybersecurity #infosec #compliance #security #data

1 year ago 0 1 0 0
Preview
Salt Typhoon: The Impact of Cyberattacks on U.S. Telecommunications Infrastructure Explore the devastating effects of Salt Typhoon's cyberattack on U.S. telecommunications. Learn about the group, their sophisticated techniques, and actionable strategies for CISOs to safeguard critic...

🚨 Salt Typhoon’s attack on U.S. telecoms exposed critical vulnerabilities, compromising metadata and surveillance systems. Learn who they are, their tactics, and what CISOs can do to defend against future threats. Don’t miss our latest blog!

#Cybersecurity #SaltTyphoon #Telecom #Infosec

1 year ago 1 1 0 0
Preview
Quantum Computing and Cryptography: A CIO's Guide to Future-Proofing Security Learn how quantum computing threatens current cryptographic systems and discover actionable steps CIOs can take to prepare their organizations for a quantum-secure future. Stay ahead of emerging cyber...

With all the hype around Google's Willow chip, the rise of several quantum computing stocks this month, and potential cryptography crisis; It is important to stay ahead of the emerging quantum threat. Check out some of the resources mentioned here:

#cyber #security #infosec #sysadmin #tech #quantum

1 year ago 3 0 0 0
Preview
LLMjacking: Stolen Cloud Credentials Used in New AI Attack The Sysdig Threat Research Team found new attack that targets large language model (LLM) services, known as LLMjacking.

LLMjacking: Stolen Cloud Credentials Used in New AI Attack sysdig.com/blog/llmjack... #infosec #cybersecurity #cloud #ai #llm

1 year ago 2 1 0 0
Preview
Finland Seizes Ship After Undersea Cable Is Cut The country’s prime minister said the incident, the latest in a series of disruptions to undersea infrastructure, underscored the danger of a so-called Russian shadow fleet.

Breaking News: Finland seized an oil tanker it suspected of involvement in damaging undersea cables and suggested it could be part of a Russian shadow fleet.

1 year ago 15232 3627 372 203
Advertisement

If you've wondered how threat actors are able to bypass 2-factor, cookie harvesting is the answer. Check out this tool. (For research purposes only).

1 year ago 6 2 0 0
Preview
California AB 3030: New AI Disclosure Rules for Healthcare and CIOs Explained Discover how California’s AB 3030 law, effective January 2025, mandates AI usage disclosures in healthcare. Learn the requirements for physicians, implications for CIOs, and the potential expansion of...

How will California's new AB 3030 law shape the future of AI in healthcare? Starting Jan 2025, healthcare & IT pros must adapt to new rules on Generative AI transparency. What does it mean for your industry? Dive in:

#AI #Healthcare #GenerativeAI #TechPolicy #CIO #California #Innovation #IT

1 year ago 4 0 0 0
Preview
How to Revert Microsoft Azure Portal's Auto-Collapsed UI Changes Frustrated with Azure's new auto-collapsed UI? Discover step-by-step settings to revert these changes and enhance your portal navigation. Simplify your Azure experience today!

Check out my post on reverting the Auto Collapsing UI in the Azure web portal.

#azure #microsoft #sysadmin

obfuscated.site/azure-portal...

1 year ago 3 0 0 0

Asking the important questions lol

1 year ago 0 0 0 0