Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2024

Rabbit AI's API Leak: Hard-Coded Keys Expose Sensitive User Data #RabbitAI #APIAttack

In this video, we analyze a notable API security breach involving Rabbit's AI tool. Hard-coded API keys in their code allowed attackers to access sensitive data, disrupt device functionality, and even view conversation histories. This incident, highlighted by a controversial response from Rabbit, serves as a critical example of the dangers of API leaks. Learn why hard-coded keys pose significant security risks and the lessons organizations can take to secure their APIs and protect user data.

Okta and Long Usernames

The Okta 52-character username vulnerability has brought to light a significant security issue within the popular identity and access management (IAM) platform used by many enterprises worldwide. This vulnerability allows attackers to exploit a username constraint to bypass certain authentication checks, which could have severe implications for businesses relying on Okta’s services for secure user verification and access control.

Trustwave Recognized in Two Asia Pacific IDC MarketScapes for Security Services

Trustwave has been named a Leader in the IDC MarketScape: Asia/Pacific (APAC) Managed Security Services (MSS) 2024 Vendor Assessment (IDC, September 2024) and a Major Player in the IDC MarketScape: Asia/Pacific Professional Security Services 2024 Vendor Assessment (IDC, September 2024). "Trustwave is proud to be recognized as a Leader and a Major Player respectively by the IDC MarketScape in MSS and PSS across APAC", said Trustwave CEO Eric Harmon.

How Healthcare Companies Can Share Data Safely for Offshore Testing and Development

Data sharing for offshore testing, development, and other operational needs is often essential in the healthcare industry. Yet, laws governing Protected Health Information (PHI) make this challenging, as sending sensitive data outside the U.S. can introduce significant regulatory risks. To stay compliant, healthcare companies need solutions that can anonymize data without compromising its usability or accuracy.

Palo Alto Networks Expedition Multiple Vulnerabilities (CVE-2024-9463, CVE-2024-9464, CVE-2024-9465, CVE-2024-9466, CVE-2024-9467)

On November 14, 2024, Palo Alto Networks disclosed five critical vulnerabilities in its Expedition configuration migration tool, a solution designed to simplify the migration of firewall configurations from third-party vendors to Palo Alto Networks’ PAN-OS infrastructure. These vulnerabilities—tracked as CVE-2024-9463, CVE-2024-9464, CVE-2024-9465, CVE-2024-9466, and CVE-2024-9467—expose users to risks such as unauthorized access, data leakage, and system compromise.

Navigating AI Governance: Insights into ISO 42001 & NIST AI RMF

As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operational efficiency, the need for ethical and safe implementation becomes more crucial than ever. While AI offers immense potential, it also introduces risks related to privacy, bias, and security, prompting organizations to seek robust frameworks to manage these concerns.

Nauzer Gotla Lightning Interview

Welcome to the first installment of Riscosity’s Lightning Interview Series. We'll be sitting down with industry leaders for informative and to-the-point conversations. In this episode, we chat about the present and future of internal audit and data security with Nauzer Gotla, Vice President of Internal Audit at Nextracker (NASDAQ:NXT), a dominant player in solar tracking solutions with revenues north of $2.5B.