NetSPI acquired startup Hubble to bolster its attack surface management capabilities, promising a consolidated offering for both internal and external visibility within four months. The transaction aims to drive significant cross-selling opportunities and operational efficiencies.
Cyber resilience has become more crucial than ever. Erwin Eimers, general manager, IT and cybersecurity and CIO/CISO of Sumitomo Chemical America, emphasized the importance of preparing for compromises and breaches, rather than just preventing them.
Mandiant's Nader Zaveri explores how AI is revolutionizing cybersecurity. He discusses the advancements in blue team capabilities, the evolving role of generative AI in threat detection and the importance of intercepting threats before they reach end users.
Two key concepts are shaping how organizations protect their digital assets: cybersecurity by default and cybersecurity by design. Professor John Goodacre, director, Digital Security by Design, UKRI, discusses the need to design technology that inherently protects against vulnerabilities.
A critical remote code execution vulnerability in PHP for Windows, affecting all releases since version 5.x, requires immediate action from server administrators. The flaw enables attackers to execute arbitrary code on remote PHP servers through an argument injection attack.
U.S. federal authorities are alerting healthcare entities about critical vulnerabilities in two medical device products from manufacturer Baxter. Both flaws can be exploited remotely, potentially jeopardizing patient care. Some experts say such disclosures in general need more attention.
Information Security Media Group editors are live at Infosecurity Europe Conference 2024 in London with an overview of opening-day activities and hot topics including the latest ransomware trends, software security, election security and artificial intelligence risks.
IBM, Rubrik, Palo Alto Networks and CrowdStrike entered the red-hot data security posture management market with nine-figure deals announced between May 2023 and March 2024. Now, Tenable reportedly wants a piece of the action as it eyes the purchase of Eureka.
In the latest weekly update, ISMG editors discussed the current state of Secure Access Service Edge solutions in 2024, vulnerabilities in Apple's Wi-Fi-based positioning system, and the patient safety questions arising after a cyberattack hit a U.S. hospital.
Bugcrowd has acquired Informer to enhance its external attack surface management, giving customers better visibility and security. The integration will bring Bugcrowd's existing bug bounty and penetration testing offerings together with new capabilities such as brand impersonation detection.
Cyberattackers are actively exploiting a vulnerability in the NextGen Healthcare Mirth Connect product, an open-source data integration platform widely used by healthcare companies, said CISA in an alert Monday. The flaw, which allows remote code execution, has been known since October 2023.
The highly targeted U.S. hospital sector could get a boost in avoiding cyberattacks with a $50 million investment by a federal research agency aimed at enhancing automation, vulnerability detection and remediation across a variety of devices in healthcare environments.
A maximum-severity bug in Intel's artificial intelligence model compression software can allow hackers to execute arbitrary code on the company's systems that run affected versions. The technology giant has released a fix for the Neural Compressor flaw, which is rated 10 on the CVSS scale.
Dealing with generative artificial intelligence is challenging for CISOs on multiple fronts, including monitoring employee use of gen AI, as well as how to red team and security test their own large language models and products, said Daniel Kennedy, principal research analyst at 451 Research.
Hackers are using generative AI to boost their malicious activities and are making progress toward autonomous, AI-driven internet exploitation. Casey Ellis, founder of Bugcrowd, highlights that while bias is a key AI concern, integrating AI safely into existing processes is a bigger challenge.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.