Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Prompt Sanitization: 5 Steps for Protecting Data Privacy in AI Apps

As Generative AI (GenAI) and Large Language Models (LLMs) become integral to modern apps, we face a critical challenge of protecting sensitive user data from inadvertent exposure. In this article, we’ll explore the importance of content filtering in LLM-powered apps, and provide strategies for its implementation. Looking for step-by-step tutorials on prompt sanitization for OpenAI, Langchain, Anthropic, and more? Skip down to the “Tutorials & further learning” section below.

The Ban That Wasn't: What Happened to the FTC's Non-Compete Ban?

Today was supposed to mark a significant shift in employment law in the US: the Federal Trade Commission’s (FTC) ban on non-compete clauses was set to go into effect. However, this anticipated change was blocked by a US District Court in Texas, leaving many wondering about the implications for small and medium-sized enterprises (SMEs) and the IT professionals they employ.

Let's Dance: Securing Access with PIM and PAM to Prevent Breaches

I know when to log out Know when to log in Get things done In the spirit of David Bowie, let's explore how to navigate the labyrinth of privileged access management without getting "Under Pressure." No one wants to mistype a common command, copy their proprietary data to a public location, or delete their operating system. Having multiple accounts—one for regular activities and specific privileged accounts to do sensitive tasks—ought to focus effort and prevent mistakes.

Understanding Adjust Memory Quotas for a Process

The windows security setting adjust memory quotas for a process, specifies who has the permission to change the maximum amount of random access memory (RAM) that a program or application can access at any specific time. Doing so controls and manages system resources, ensuring the system runs smoothly. The adjust memory quotas for a process setting decides who can change a program or process' memory quota.

More than a security alert: A guide to nudges

As American poet Nikki Giovanni wisely observed, "Mistakes are a fact of life. It is the response to error that counts." This rings particularly true in the world of cyber security. Even the most vigilant individuals can make mistakes—after all, we’re only human. What truly matters is how we respond. Imagine a platform that automatically detects risky security behaviours, alerting employees and nudging them to fix their mistakes before they escalate?

Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk

JFrog’s security research team continuously monitors open-source software registries, proactively identifying and addressing potential malware and vulnerability threats to foster a secure and reliable ecosystem for open-source software development and deployment. This blog details a PyPI supply chain attack technique the JFrog research team discovered had been recently exploited in the wild.

A Peek Inside Fireblocks Tokenization Engine: The Backbone of Your Tokenization Solution

Fireblocks offers businesses a broad suite of solutions to meet all of their tokenization needs. The Fireblocks Tokenization Engine — only one part of our ecosystem — is a platform powering the future of financial markets and digital asset ownership. Businesses can use the Tokenization Engine to launch and manage any tokenization solution and securely mint, custody, distribute, and manage tokenized assets.

Employee Cybersecurity Awareness Training Strategies for AI-Enhanced Attacks

With the adoption of AI in almost every sphere of our lives and its unending advancement, cyberattacks are rapidly increasing. Threat actors with malicious intent use AI tools to create phishing emails and other AI-generated content to bypass traditional security measures. On the bright side, the security capabilities of AI are limitless. AI-enhanced attacks refer to cybersecurity events that use artificial intelligence to compromise individuals' and organizations' safety.

What you should know about PHP code security

When it comes to web development, PHP is a widely used scripting language. With its popularity, it is crucial to understand the potential security risks associated with PHP and the measures to mitigate them. Whether you deploy CMS applications using WordPress or build enterprise applications with the Laravel PHP framework, the importance of PHP security and the business impact of some notable PHP interpreter vulnerabilities are crucial for developers to get right.