New OpenTofu Providers for Cisco Technologies Now Available!

New OpenTofu Providers for Cisco Technologies Now Available!

If you are cloud-native, you probably work with Terraform modules and providers. Since Terraform changed its license, some communities and companies have decided to keep the project open-source and create OpenTofu. OpenTofu is a fork of Terraform created as an initiative by Gruntwork, Spacelift, Harness, Env0, Scalr, and others in response to HashiCorp’s switch from an open-source license to the BUSL. OpenTofu is open-source, community-driven, and managed by the Linux Foundation. Users can use OpenTofu…

Read More

99% of UK Businesses Faced Cyber Attacks in the Last Year

99% of UK Businesses Faced Cyber Attacks in the Last Year

Nearly all businesses with at least 2,000 employees were breached by cyber attackers in the last 12 months, a new report has found. The biggest risk factor, cited by 46%, was remote and hybrid workers. Dispersed workforces raise the risk of data breaches by elying on unsecured networks and personal devices, and ensuring security protocols across multiple locations while managing access presents significant challenges for IT teams. “Where policies are inconsistent, they can create gaps…

Read More

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive, a non-profit digital library best known for its Wayback Machine, has disclosed a major data breach affecting over 31 million users as well as a series of distributed denial-of-service attacks. On the afternoon of Oct. 9, visitors of The Internet Archive started seeing pop-up messages that read: “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just…

Read More

Only a Quarter of Cybersecurity Professionals are Women

Only a Quarter of Cybersecurity Professionals are Women

As of 2023, women make up only 20% and 25% of the cybersecurity workforce, according to training body ISC2. New research from Deloitte explores the reasons behind this gender gap, despite the high demand for skilled professionals in the industry. Half of young working women interested in cybersecurity feel they lack sufficient knowledge of the field to pursue a career in it. Furthermore, 55% of all women surveyed believe the industry could prove intimidating, and…

Read More

20% of Generative AI ‘Jailbreak’ Attacks are Successful

20% of Generative AI ‘Jailbreak’ Attacks are Successful

Generative AI jailbreak attacks, where models are instructed to ignore their safeguards, succeed 20% of the time, research has found. On average, adversaries need just 42 seconds and five interactions to break through. In some cases, attacks occur in as little as four seconds. These findings both highlight the significant vulnerabilities in current GenAI algorithms and the difficulty in preventing exploitations in real time. Of the successful attacks, 90% lead to sensitive data leaks, according…

Read More

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Are Ghost Calls a Problem? Yes, if They Don’t Stop

A ghost call is an incoming call with no one on the other end when you answer it. Sometimes it’s an unrecognized number; other times the caller ID shows “Unknown.” Getting an occasional ghost call is common and nothing to worry about. But persistent ghost calls can be a major concern — particularly for businesses. Here’s why. Frequent ghost calls can tie up phone lines, preventing legitimate calls from reaching the company. This disruption can…

Read More

One-Third of UK Teachers Do Not Have Cybersecurity Training

One-Third of UK Teachers Do Not Have Cybersecurity Training

Teachers in schools in England are not receiving sufficient cybersecurity training, a new poll has revealed. A third of teachers haven’t completed any in the last academic year, while only 66% of those who did found it useful. These results come from a Teacher Tapp survey of teachers across England from the Office of Qualifications and Examinations Regulation, or Ofqual. It also revealed the prevalence of cyber attacks within the education sector in the U.K….

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The Urgency of Security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

Global Cyber Attacks to Double from 2020 to 2024, Report Finds

Global Cyber Attacks to Double from 2020 to 2024, Report Finds

On the first day of Cybersecurity Awareness Month in the U.S., research has revealed that the number of significant global cyber attacks in 2024 will be double that of 2020. A new report from insurer QBE, Connected Business: digital dependency fuelling risk, predicts that organisations will be hit by 211 disruptive and destructive cyber attacks this year. Disruptive incidents are reversible and only impact data availability, integrity, or access — such as distributed denial-of-service attacks….

Read More

HackerOne: 48% of Security Professionals Believe AI Is Risky

HackerOne: 48% of Security Professionals Believe AI Is Risky

A recent survey of 500 security professionals by HackerOne, a security research platform, found that 48% believe AI poses the most significant security risk to their organization. Among their greatest concerns related to AI include: Leaked training data (35%). Unauthorized usage (33%). The hacking of AI models by outsiders (32%). These fears highlight the urgent need for companies to reassess their AI security strategies before vulnerabilities become real threats. Must-read security coverage AI tends to…

Read More
1 2 3 4 5 15