Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

AI and Deep Learning At Work: How to Know If Your Images Are Storing Sensitive Information

In today’s rapidly digitizing world, the importance of data security has become paramount. With the increasing amount of sensitive information being shared and stored online, securing information from cyber attacks, information breaches, and theft has become a top priority for companies of all sizes. Data loss prevention (DLP) is a critical part of the Netskope Intelligent Security Service Edge (SSE) security platform, providing best-in-class data security to our customers.

Suffolk University Breach Exposes Student Social Security Numbers and More

Suffolk University is a private research university located near Boston, Massachusetts. The school serves over 7,500 students each year and offers more than 100 undergrad, professional, and graduate programs. A huge number of students submit data for financial aid, tuition, and more, and that data could be at risk at a school that doesn't secure its data well. The school earns more than $118 million in revenue annually.

Weekly Cybersecurity Recap June 2

High-profile companies, government agencies, healthcare companies, and government contractors were all exposed in data breaches this week. Tesla is one of the biggest companies to suffer from a breach this week, but the US Marine Corps, ABB, Apria Healthcare, and Suffolk University were also hit by ransomware gangs and targeted hackers. Get the details about these attacks below and stay up-to-date on any breaches that might impact you or your loved ones.

More Network Security Monitoring Tools Doesn't Mean More Visibility

Network security monitoring tools are a critical component of any IT security toolkit. These tools help protect your network from online threats by looking for weaknesses and potential dangers in your organization's digital properties. But as digital ecosystems have expanded into the cloud, remote locations, and across geographies – the number of monitoring tools has skyrocketed.

Trustwave Action Response: Zero Day Exploitation of MOVEit (CVE-2023-34362)

On May 31, threat actors were discovered targeting a critical zero day in MOVEit Transfer software resulting in escalated privileges and unauthorized data access. The vulnerability being exploited is an SQL injection and has since been patched. Resources links, including one for the patch, are at the bottom of this post. MOVEit Transfer is a managed file transfer (MFT) solution developed by Ipswitch (a subsidiary of Progress Software).

CrowdStrike Enhances Falcon Discover to Reduce the Attack Surface, Streamline Operations and Lower Costs

CrowdStrike Falcon® Discover delivers deep asset visibility with no hardware to deploy or manage, providing valuable context for all of your assets. For IT and security teams alike, Falcon Discover is a powerful tool to stop breaches. The majority of CrowdStrike customers already use Falcon Discover to improve their IT and security posture.

Too Many Tools, Not Enough Hyperautomation

The evolution of cybersecurity tools is nothing short of remarkable, but I suppose they had to be when it isn’t just the Morris Worm you’re worried about. There has been a wave of buzz around the latest technology in years gone by. EDR evolved into MDR, then SASE, and in recent times we’ve seen Immutable Backup take the front seat.