Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence

ChatGPT and other Large Learning Modules have been in use for less than a year, yet these applications are transforming at an almost exponential rate. The changes taking place present an odd duality for the cybersecurity world. It is both a boon and a danger to security teams. In some cases, enabling teams to do more with less.

Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave: Static Application Security Testing (SAST) Q3 2023

In our first year participating in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023, we’re thrilled that Snyk has been recognized as a Strong Performer in a mature, yet evolving, enterprise software security category. Snyk is disrupting the SAST market with a developer-first approach to application security, illustrated by our position in strategy and market presence in the evaluation.

John Pye Auctions kick-starts secure endpoint privilege management with ManageEngine

John Pye is the largest and fastest-growing auction house network in the United Kingdom, with vast experience operating in multiple sectors of the economy. The business specializes in providing appraisal and valuation services. In order to be credible with its IT services, especially endpoint management and remote user control management, the business partnered with ManageEngine. Listen to what the head of IT had to say about our solutions!

Introducing Data-centric Policy-enforced Access Control and Data Protection for NetApp ONTAP

As increased cyber threats and regulations governing the handling of sensitive personal data, government and defense data are enacted, the ability to automate the discovery, classification and protection of sensitive information is critical across enterprise content management systems. To this end, archTIS recently extended NC Protect’s capabilities to support NetApp ONTAP to ensure we support a wide range of enterprise platforms.

Stealthy VBA Macro Embedded in PDF-like Header Helps Evade Detection

In the ever-evolving landscape of malware threats, threat actors are continually creating new techniques to bypass detection. A recent discovery by JPCERT/CC sheds light on a new technique that involves embedding a malicious Word document within a seemingly benign PDF file using a.doc file extension.

Friday Flows Episode 6: Normalize Alerts with ChatGPT

The strides in GenAI have been remarkable this year, but we're all still trying to figure out how to impact our day-to-day work. In this demo, we use AI in the best way we know how to at Tines: by speeding up a security analyst's work and making their life a little easier! Use ChatGPT to normalize alert formats, in this case from CRWD. Alerts from multiple sources are converted into a standard format for easier processing by a SOC, and a ticket is then created.

How Social Engineering Took Down MGM and Caesars

Two major players in hospitality and gaming, MGM and Caesars, were victims of two, separate cyber attacks. While the details are still unknown, what is known is that Caesars paid the hackers a multi-million dollar ransom, and that both attacks began with social engineering.