Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Can machines dream of secure code? From AI hallucinations to software vulnerabilities

As GenerativeAI expands its reach, the impact of software development is not left behind. Generative models — particularly Language Models (LMs), such as GPT-3, and those falling under the umbrella of Large Language Models (LLMs) — are increasingly adept at creating human-like text. This includes writing code.

Introducing Cloudflare's 2023 phishing threats report

After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently noted, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (BEC), a type of malware-less attack that tricks recipients into transferring funds — for example — has cost victims worldwide more than $50 billion, according to the FBI.

Coffee Talk with SURGe: The Interview Series featuring Jake Williams

Join Audra Streetman and special guest Jake Williams (@MalwareJake) for a discussion about hiring in cybersecurity, interview advice, the challenges associated with vulnerability prioritization, Microsoft's Storm-0558 report, and Jake's take on the future of AI and LLMs in cybersecurity.

Combatting Cloud Threats: The Accelerated Attack Speed of 2023 (LIVE)

Cloud threats are evolving and attackers are moving faster than ever! Join Sysdig’s Michael Clark (Director, Threat Research) and Anna Belak (Director, Office of Cybersecurity Strategy) LIVE on Linkedin, Twitter, and Youtube, as they discuss key findings from Sysdig’s �������� ������������ ���������� ������������ ������������. From cloud automation as a weapon to software supply chain vulnerabilities — the annual report authored by Sysdig’s Threat Research Team exposes shocking statistics on the evolving tactics of attackers lurking within the clouds.

The Role of API Inventory in SBOM and Cyber Security

Creating a Software Bill of Materials (SBOM) is crucial to software supply chain security management. It helps fortify your software supply chain and reduces the likeliness of your software being exploited. But did you know there's a way to enhance your software's security further? Well, that's when API inventory comes into the picture. Including API inventory in your SBOM can make your software solution more resilient to cyberattacks.

Dark AI tools: How profitable are they in the underground ecosystem?

Threat actors are constantly looking for new ways or paths to achieve their goals, and the use of Artificial Intelligence (AI) is one of these novelties that could drastically change the underground ecosystem. The cybercrime community will see this new technology either as a business model (developers and sellers) or as products to perpetrate their attacks (buyers).

Penetration Testing in AWS: Can You Test Your Cloud?

AWS Security provides organisations with the tools and resources they need to protect their applications, services and data in the cloud. It can help businesses identify areas of vulnerability, detect malicious activity, monitor traffic patterns for suspicious activity and prevent unauthorised access. It includes features like encryption, authentication, risk assessment and compliance monitoring.

What's ABAC? How Attribute Based Access Control Works

Multi-cloud environments are getting plenty of buzz in recent years. It’s no wonder, really, that increased flexibility, risk mitigation, performance optimization and compliance adherence associated with the practice have drawn in new muli-cloud evangelists across the industry. For all the great benefits multi-cloud offers, it does present one significant challenge: how do you ensure a single point of control while establishing consistent security policies for all users?

Cloud Application Security: What Every Organization Needs to Know About Protecting Data in SaaS Apps

The rise of hybrid work has accelerated digital transformation for organizations of all sizes. As a result, more and more applications and data are moving to the cloud. While this has created a number of benefits — including cost savings, ease of access, and increased operational efficiencies — the cloud has also made it more challenging to protect sensitive data.

Simplify and Secure Applications Across Clouds with the Latest, High-Performance Thunder ADC Images

In today’s hybrid environments, delivering a consistent application experience across clouds, securely, and reliably has become an imperative. The A10 Thunder® Application Delivery Controller (ADC), which comes in multiple form factors, provides the security, performance and availability required for applications in a hybrid cloud infrastructure.