Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

ChatGPT DLP Filtering: How to Use ChatGPT without Exposing Customer Data

Advancements in AI have led to the creation of generative AI systems like ChatGPT, which can generate human-like responses to text-based inputs. However, these inputs are at the discretion of the user and they aren’t automatically filtered for sensitive data. This means that these systems can also be used to generate content from sensitive data, such as medical records, financial information, or personal details.

MXDR Demo: Eradicating Multi-Vector Fileless Malware Attack in Minutes

CrowdStrike Falcon Complete XDR is the world’s first managed extended detection and response (MXDR) service with end-to-end remediation, from the #1 MDR leader. In this video, we demonstrate how the Falcon Complete XDR service team identifies, triages, and fully-remediates the cross-domain XDR threat activity associated with an advanced, file-less malware attack as the adversary attempts to persist and exfiltrate from servers in the customer’s environment.

Beyond the ransom: Unpacking the true cost of a ransomware attack

Ransomware has become a significant threat in today’s digital landscape, with cybercriminals using it as an effective means of making money, often with a low cost and high profit margin. Victims rarely recover their stolen data in full, despite promises from the perpetrators, so most of the time paying the ransom is not a viable solution.

Part 2: Is an RFP the Best Use of Your Organization's Resources?

Yesterday I wrote about some common Request for Proposal (RFP) pitfalls we have seen over the years at Trustwave. (part 1) Trustwave offers a wide range of services — from Managed Detection & Response (MDR), Managed SIEM services from Splunk, Qradar, and Microsoft Sentinel security testing, to complex red team engagements, so we‘ve seen numerous of styles and approaches in the format and presentation of the requests.

4 best practices for cultivating developer security adoption

Implementing adequate software supply chain security is a challenging feat in 2023. Attackers are becoming more sophisticated, and the growing complexity of modern applications makes them difficult to defend. We’re talking microservices, multi-cloud environments, and complex workflows — all moving at the speed of business. To address these challenges, the Snyk team organized two roundtable discussions, one held in North America and the other in EMEA.

Thousands of Unlimited Care Inc Employees Lose Their Data in Recent Breach

Unlimited Care Inc. is a home health company that offers help to patients in Westchester, New York, and surrounding locations. The company employs more than 2,500 people and has an annual revenue of more than $250 million. The organization recently suffered from a data attack that could have compromised a large number of company employees.

The 443 Podcast, Ep. 237 - Operation Cookie Monster

This week on the podcast, Corey Nachreiner and Marc Laliberte discuss another cybercrime marketplace takedown dubbed Operation Cookie Monster. After that, they discuss Microsoft’s attempts to limit the distribution of a popular hacking toolkit. Finally, we discuss a recent analysis by Dr. Ken Tindell of Canis Automotive Labs about how criminals could steal his friend’s Toyota Rav4.

CVE-2023-27350: Exploitation of Critical RCE Vulnerability in PaperCut Print Management Server

On April 19, 2023, PaperCut confirmed print management servers vulnerable to a critical remote code execution vulnerability (CVE-2023-27350: CVSS 9.8) are being actively exploited by threat actors. CVE-2023-27350 could allow unauthenticated threat actors to bypass authentication and execute arbitrary code in the context of SYSTEM on a PaperCut Application Server. Zero Day Initiative responsibly disclosed the vulnerability to PaperCut on January 10, 2023; PaperCut released a patch on March 8, 2023.

How Egnyte Makes working with Large Media Files a Breeze for Agencies and Publishers

For media agencies and publishers, working with large files such as audio, images, and video is the norm. Individual files can reach several hundred gigabytes in size, each of which are components that will be imported into editing and design applications like Premiere Pro and InDesign to create final campaign assets.