BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023

BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023

The number of Microsoft vulnerabilities has mostly flattened in 2023, with elevation of privilege and identity attacks being particularly common, according to BeyondTrust’s annual Microsoft Vulnerabilities report. Identity and access management solutions company BeyondTrust studied the most significant CVEs of 2023 and Microsoft vulnerability data from Microsoft’s monthly Patch Tuesday bulletins. The report includes vulnerability trends and tips about how to reduce identity attacks. Microsoft reported 1,228 vulnerabilities in 2023 The total number of Microsoft…

Read More

Over 850 Vulnerable Devices Secured Through CISA Ransomware Program

Over 850 Vulnerable Devices Secured Through CISA Ransomware Program

US government and critical infrastructure entities were sent 1754 ransomware vulnerability notifications under the Ransomware Vulnerability Warning Pilot (RVWP) program in 2023, resulting in 852 vulnerable devices being secured or taken offline. The highest number of alerts were sent to government facilities (641), which encompasses a range of federal, state and local government organizations, including schools and higher education facilities. Healthcare and public health received the second highest number of ransomware vulnerability notifications, at 440….

Read More

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing

By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more critical than ever. As organizations are doing everything they can to protect sensitive information, biometric security systems have emerged as a front-runner. Among these, voice ID systems are a critical component that organizations rely on as an additional layer of authentication. For all its advantages, these state-of-the-art systems must still undergo rigorous voice ID penetration…

Read More

How to Remove Personal Information From Data Broker Sites | McAfee Blog

How to Remove Personal Information From Data Broker Sites | McAfee Blog

Data brokers are companies that collect your information from a variety of sources to sell or license it out to other businesses. Before they can pass your data along, brokers analyze it to put you into specific consumer profiles. Consumer profiles help businesses suggest products you might like and create targeted marketing campaigns based on your interests.   Companies who buy data from brokers use it for things like marketing or risk mitigation. For example, if…

Read More

TransUnion transforms its business model with IT

TransUnion transforms its business model with IT

At the core of its strategy is the mountain of data that TransUnion has acquired — along with more than 25 companies — over decades. That data is in the process of being unified on a multilayered platform that offers a variety of data services, including data ingestion, data management, data governance, and data security. Once completed within two years, the platform, OneTru, will give TransUnion and its customers access to TransUnion’s behemoth trove of…

Read More

Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach

Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach

The US Federal Trade Commission (FTC) will send a total of $5.6m in refunds to customers of Ring, a home camera provider, as the result of a settlement with Ring over security and privacy failings. Ring, which was bought by tech giant Amazon in 2018, reached the settlement with the FTC in 2023 over charges the company allowed employees and contractors to access consumers’ private videos and failed to implement security protections, enabling hackers to…

Read More

Why banning TikTok will not solve data security challenges

Why banning TikTok will not solve data security challenges

TikTok, the social media platform owned by the Beijing-based company ByteDance, has come under fire from Washington, D.C. lawmakers. Legislation signed into effect on April 24 includes a provision that requires ByteDance to sell the social media app in the next nine to twelve months or be banned in the United States. According to the Associated Press, the ban would not go into effect for at least a year and will likely take longer due…

Read More

OpenAI's GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities

OpenAI's GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities

The GPT-4 large language model from OpenAI can exploit real-world vulnerabilities without human intervention, a new study by University of Illinois Urbana-Champaign researchers has found. Other open-source models, including GPT-3.5 and vulnerability scanners, are not able to do this. A large language model agent — an advanced system based on an LLM that can take actions via tools, reason, self-reflect and more — running on GPT-4 successfully exploited 87% of “one-day” vulnerabilities when provided with…

Read More

M&A action is gaining momentum, are your cloud security leaders prepared?

M&A action is gaining momentum, are your cloud security leaders prepared?

As we near the halfway point of the year, organizations are under tremendous pressure to grow businesses across all industries. It’s no secret: bottom lines must rise and 2024 has been earmarked as a pivotal year to revert to growth mode. Many organizations will find an uphill battle here; the previous few years have taken a significant toll. From supply chain issues, layoffs, delayed pipelines, and stalled progress due to pulled focus, we are due…

Read More

CVE-2024-20353, CVE-2024-20359: Frequently Asked Questions About ArcaneDoor

CVE-2024-20353, CVE-2024-20359: Frequently Asked Questions About ArcaneDoor

Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances. Background The Tenable Security Response Team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding an espionage campaign called ArcaneDoor. FAQ What is ArcaneDoor? ArcaneDoor is the name given to an espionage-focused campaign disclosed by researchers at Cisco Talos on April 24. The campaign involves a reported state-sponsored actor who has been targeting…

Read More
1 2 3 2,119