Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Operation Grandma: A Tale of LLM Chatbot Vulnerability

Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality and client support. This shift is receiving a lot of positive attention, offering a welcome change given the common frustrations with bureaucratic delays and the lackluster performance of traditional automated chatbot systems.

What Udemy is building with AI in Tines

For the security team at Udemy, AI in workflow automation provides an opportunity to unlock new time savings while keeping their organization secure, and protecting their online learning and teaching marketplace of 62 million users. But like all good security teams, they don’t want to sacrifice data security or privacy. AI in Tines, which is secure and private by design, provides that all-important layer of control - data never leaves the region, travels online, is logged, or is used for training.

Introducing AI in Tines

Everyone in the market is talking about AI right now. It’s a modern marvel; some say it might even be as big as the Industrial Revolution. We’re not big on grandiose statements like that, but we are big on delivering products that help our customers be more efficient and secure and, as a result, have happier and more engaged teams. That’s why today, we’re excited to announce AI in Tines. Two powerful features to make Tines even more accessible to any member of your organization.

Monitor DNS logs for network and security analysis

The Domain Name System (DNS) translates domain names (e.g., datadoghq.com) into IP addresses via a process called DNS resolution. This translation facilitates all kinds of network communication, from enabling web browsers to connect to a desired page without requiring users to remember IP addresses, to internal communication across private infrastructure, such as Kubernetes environments.

Ultimate Guide to Vendor Risk Scoring

Vendor risk scoring is a critical component within vendor risk management (VRM) or third-party risk management (TPRM) programs and an organization’s overall risk management strategy. Risk scoring is an integral tool in the risk assessment process, helping organizations identify, evaluate, and mitigate potential risks associated with third-party vendors or service providers.

How Trustwave Accelerates Your Security and ROI with Microsoft's 365 Enterprise Plan

Trustwave's just-released Microsoft Security-focused solutions are designed to bring clients greater security, resilience, and a higher return on their investment by helping optimize their Microsoft 365 enterprise plan. Let's drill down and see exactly how organizations will gain the most from the Microsoft 365 enterprise plan, (including E5 and G5) by partnering with Trustwave.

Why Firewalls Are Not Enough in Today's Cybersecurity Landscape

Firewall technology has mirrored the complexities in network security, evolving significantly over time. Originally serving as basic traffic regulators based on IP addresses, firewalls advanced to stateful inspection models, offering a more nuanced approach to network security. This evolution continued with the emergence of Next-Generation Firewalls (NGFWs), which brought even greater depth through data analysis and application-level inspection.

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

During a recent client investigation, Trustwave SpiderLabs found a malicious version of the Advanced IP Scanner installer, which contained a backdoored DLL module. Our client had been searching for the Advanced IP Scanner tool online and inadvertently downloaded the compromised installer from a typo-squatted domain that appeared in their search results. Figure 1. Search results for Advanced IP Scanner may direct users to a malicious domain.

Vulnerability Management Modernization & FedRAMP: Resilient Cyber Podcast

Ever wonder how Nucleus got started? Curious to know what our CEO and co-founder Steve Carter is working on? You’re in luck. Steve joined host Chris Hughes on the Cyber Resilience podcast to talk about those topics and more. Additionally, Steve and Chris explored the process for earning FedRAMP authorization, some of the particular vulnerability management challenges government agencies are dealing with, and why risk-based vulnerability management resonates with the government community.