Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Code Llama 70B Launch & More - This Week in AI

In a groundbreaking move, Meta has released Code Llama 70B, the latest iteration in its series of open-source code generation models. Code Llama 70B maintains the tradition of an open license, fostering research and commercial innovation. This release builds upon its predecessors, including Llama 2, and is poised to redefine AI-driven code generation. One standout feature in the suite is CodeLlama-70B-Instruct, a finely tuned version explicitly designed for instruction-based tasks.

Leading AI and LLM Security with Encora Partnership: A Milestone Announcement

Protecto, the pioneer in Generative AI-driven (Gen AI) data protection, is thrilled to announce a groundbreaking partnership with Encora, a leading digital engineering services company. This collaboration marks a significant step forward in securing the future of AI and Large Language Model (LLM) applications, safeguarding sensitive data and ensuring regulatory compliance in today's increasingly data-driven world.

Navigating Deep Fakes and Geopolitical Risks in 2024: The AI Defensive Edge || Razorthorn Security

Dive into the complex world of deep fakes and the looming geopolitical risks of the upcoming year in my latest video. From the potential misinformation campaigns during elections to the role of AI, I explore how these elements intertwine and impact our digital landscape. AI is not just a potential threat; it can also be a formidable defense. I discuss the emergence of AI-driven products designed to counteract misinformation and the evolving landscape of AI battling AI. Are we stepping into a future reminiscent of sci-fi, where machines combat each other, leaving humans out of the crossfire?

GEICO Finds Employee Personal Data Exfiltrated via 2023 MOVEit Breach

The Government Employees Insurance Company (GEICO) is a privately owned insurance group with 18 branches in the US. They provide insurance plans for all aspects of life, including auto, motorcycle, travel, pet, homeowner, renter, and jewelry options. GEICO employs over 38,000 people nationwide, many of whom receive discounted prices for their insurance. GEICO also offers dental insurance to its employees through Delta Dental of California (DDC) and affiliates.

Weekly Cybersecurity Recap February 2

This week started with a cyber event targeting a Californian insurance brokerage, Keenan & Associates; the assailants garnered over 1.5 million records from the attack. GEICO also announced data from their organization was compromised, although the breach didn’t happen through them; one of their vendors was hit by the global MOVEit event, exposing the data of over 70k employees and associates.

Network Analytics Logs: Using Splunk to view network traffic and DDoS attacks

Cloudflare Magic Transit is a network security solution that offers DDoS protection, traffic acceleration, and much more from every Cloudflare data center— for on-premise, cloud-hosted, and hybrid networks. In this video, we show how to integrate Cloudflare Network Analytics logs to view network traffic and DDoS attacks in your Splunk dashboard.

Blocking Compromised Tokens with Wallarm

In our Annual API ThreatStats report, we highlighted the increasing threat of API Leaks. An API Leak is the disclosure of sensitive API information, such as a token, credential, or private schema. These leaks can occur directly via the API itself, but also via third party tools used to manage source code, such as Github or Postman. API Leaks came in at number 4 in our dynamic top 10 list of API Security issues.

Introduction to Information Governance

Organizations are experiencing explosive growth in the volume and variety of data they collect, store and process. Unfortunately, many of them do not understand what types of data they are handling — and what value that data has — so they cannot maintain proper control over it. As a result, they often suffer serious legal, financial and reputational consequences. Proper information governance can help you avoid the same fate.

Signs Your Streaming Accounts Have Been Hacked

As more people have shifted to using streaming services for shows, movies and music, keeping those accounts secure has become crucial to prevent them from being hacked. Some signs that point to your streaming account being hacked include being unable to log in to your account, unusual login attempt notifications and an upgraded account you didn’t authorize. Continue reading to learn five signs that point to your streaming account being hacked and what you should do if it is.

Friday Flows Episode 19: Manage CrowdStrike IOCs in Slack

Analyst’s often take in IOCs from many different sources and manually copy & paste them into security tools to search for them across environments or add them to blocklists. This can be time-consuming & repetitive. This Friday Flows features a workflow that utilizes APIs to easily manage IOC’s in CrowdStrike & collaborate with peers in Slack.