Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AppSec Vulnerability Management: Uniting AppSec and CloudSec

Businesses have come a long way in their individual journeys to digital transformation, all to enhance their customer and workforce experiences. This shift elevated the importance of both Application Security (AppSec) and Cloud Security (CloudSec) in safeguarding digital assets and ensuring infrastructure resilience.

A guide to insider threats in cyber security

With so many cyber security priorities to balance, it isn’t always easy to know where to start. The mistake that many organisations make is to view threats originating from outside as their sole focus. However, with insider threats proving a persistent presence, this can often be a very costly oversight. This guide seeks to provide clarity on the different types of insider threats you need to be aware of and the controls and processes you can put in place to defend against them.

Hunting PrivateLoader: The malware behind InstallsKey PPI service

Since July 2022, Bitsight has been tracking PrivateLoader, the widespread malware downloader behind the Russian Pay-Per-Install (PPI) service called InstallsKey. At the time, this malware was powering the now decommissioned ruzki PPI service. Figure 1 presents a brief description of the service, which was found in their sales telegram channel. Fig. 1 - Service description on telegram channel profile (Russian and English).

How to Spot Potential Spam Attempts and How You Can Handle Them

More often, spam emails are similar to an unwelcome houseguest who wouldn’t go away. Opening your inbox to discover it filled with unwanted messages is a common and frustrating experience for many. Some are merely annoying advertisements vying for attention, while others take a more sinister approach, aiming to extort individuals from scams or infect gadgets with viruses. Therefore, being alert and discerning while navigating the internet is essential for avoiding threats.

LlamaParse and LlamaCloud - This Week in AI

The realm of artificial intelligence (AI) unfolds like a captivating story, constantly introducing groundbreaking tools and methods that redefine possibilities. Retrieval-augmented generation (RAG), a technology that empowers applications to glean relevant information from vast datasets and utilize it for various tasks, is a prime example of this advancement.

Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor

In the realm of AI collaboration, Hugging Face reigns supreme. But could it be the target of model-based attacks? Recent JFrog findings suggest a concerning possibility, prompting a closer look at the platform’s security and signaling a new era of caution in AI research. The discussion on AI Machine Language (ML) models security is still not widespread enough, and this blog post aims to broaden the conversation around the topic.

Improving OT Security in Industrial Processes

Have you ever considered that even before you enjoy the first sip of your favorite morning beverage, you have probably interacted with at least half of the 16 critical infrastructure sectors that keep a nation running? In one way or another, the simple act of brewing a cup of tea would probably not be possible without interacting with water, energy, manufacturing, food and agriculture, waste, transportation, and financial sectors.