Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Future (and Present) of the Internet, AI, and Tech with Nicholas Thompson

This week, host João Tomé is joined by Nicholas Thompson, CEO of The Atlantic and former editor-in-chief of Wired, during his participation at Web Summit, the international event held in Lisbon with over 70,000 attendees. In this conversation, Thompson discusses the Internet, AI, social media, and the challenge of protecting content creators from AI crawlers—a problem Cloudflare’s AI Audit is designed to address. We also explore the 2024 media landscape, its future, and its role in supporting democracy.

Turn unstructured data into insights with Sumo Logic

Achieve maximum visibility into your structured and unstructured data with Sumo Logic’s AI-powered Log Analytics Platform. With schema on-demand, there’s no need to organize your data before uploading. Gain real-time insights, visualize patterns, and centralize your data into a single source of truth to power every step of your DevSecOps journey.

GDPR and CPRA: A Unified Call for Data Transparency and Accountability

The General Data Protection Regulation (GDPR) of the European Union and the California Privacy Rights Act (CPRA) represent landmark regulations designed to protect consumer data privacy. While GDPR became enforceable in May 2018, CPRA came into effect in January 2023, building on its predecessor, the California Consumer Privacy Act (CCPA). Both laws aim to empower individuals with greater control over their personal data while imposing rigorous obligations on businesses.

Command injection in 2024 unpacked

Command injection is a vulnerability still very prevalent in web applications despite being less famous than its cousins SQL injection or Code injection. If you’re familiar with other injection vulnerabilities, you’ll recognize the common principle: untrusted user input is not properly validated, leading to the execution of arbitrary system commands. This flaw occurs when unvalidated input is passed to system-level functions. So how prominent is command injection actually?

CrowdStrike Partners with MITRE Center for Threat-Informed Defense to Launch Secure AI Project

As organizations deploy more AI-enabled systems across their networks, adversaries are taking note and using sophisticated new tactics, techniques and procedures (TTPs) against them. The need for continued innovation to fight these threats is paramount.

NotLockBit Ransomware, Embargo Ransomware, Emennet Pasargad, and More: Hacker's Playbook Threat Coverage Round-up: November 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we highlight attack coverage for several new threats. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats. Additional details about the threats and our coverage can be seen below.