Cyber Security News


Channel's geo and language: USA, English
Category: Technologies


Be Cyber Aware.
Our chat: t.me/cybersecuritynewschat
Our vacancies channel: @CyberSecurityJobs
LinkedIn: https://www.linkedin.com/company/securitynews/
Improve Your Cyber Skills: https://linktr.ee/cybersecuritynews
📩 Cooperation: @cybersecadmin

Related channels  |  Similar channels

Channel's geo and language
USA, English
Statistics
Posts filter


Banking Giant Wells Fargo Suffers Data Breach, Sends Two Notification Letters

In the breach notification letter, the banking giant claims to be “taking measures to monitor (customer) account(s) for suspicious events or changes, and is continually reviewing security measures to reduce the likelihood of this happening in the future”.

Cyber_Security_Channel


LG Smart TVs at Risk of Attacks, Thanks to 4 OS Vulnerabilities

They impact webOS 4.9.7-5.30.40 running on LG43UM7000PLA, webOS 5.5.0-04.50.51 running on OLED55CXPUA, webOS 6.3.3-442 (kisscurl-kinglake)-03.36.50 running on OLED48C1PUB, and webOS 7.3.1-43 (mullet-mebin)-03.33.85 running on OLED55A23LA.

Cyber_Security_Channel


Optiv Expands Strategic Alliance with Google Cloud to Deliver World-Class Cybersecurity Expertise

The Optiv and Google Cloud alliance brings clients:

• End-to-end SecOps transformation
• Scalable security operations solutions
• Third-party solutions through Google Cloud Marketplace

Sunil Potti, general manager and vice president of cloud security, Google Cloud, added, "Our partnership with Optiv combines the technology, people, and process necessary to make security as pervasive as possible and materially less complex.

Our globally recognized cybersecurity offerings including Chronicle Security Operations powered by our advanced AI services, coupled with Optiv's end-to-end expertise, from strategy to execution, enables clients to transform their businesses forward, safely

Cyber_Security_Channel


2024 Expectations From the SEC on AI, Cybersecurity and ESG

Organizations will likely remain hesitant to publicize at an early stage whether an incident has a significant impact on current or future revenues and it may take time for them to factor in reputation risk and loss of customer or investor trust into their determinations.

It is possible that the SEC will continue to interpret poorly considered or excessively risk-averse communications strategies as misrepresentations, meaning that organizations must have effective strategies in place ahead of an incident.

The SEC’s new climate disclosure rule has attracted legal and political challenges,8 given the current politicization of ESG.

These challenges will test how much climate information the SEC can require from companies under their existing legal authority.

Cyber_Security_Channel


Misconfigured SaaS Applications Led to the Home Depot Data Breach, and Experts Say it’s no Surprise

Tim Bach, senior VP of security engineering at AppOmni, said while the rapid identification of the incident as the result of a SaaS misconfiguration was impressive, the fact this was the source of the breach was far from surprising.

Cyber_Security_Channel


Google Survey: 63% of IT and Security Pros Believe AI Will Improve Corporate Cybersecurity

The advent of AI in cybersecurity marks a transformative era in the realm of digital defense, bringing a blend of promising breakthroughs and intricate challenges," the researchers wrote in their survey.

"AI has the potential to be a vital ally in bolstering security defenses, identifying emerging threats, and facilitating swift responses.

Cyber_Security_Channel


Palo Alto Networks and Google Cloud Expand Partnership to Revolutionize Cybersecurity with AI

Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyber threats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally across all sectors.

Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation.

Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Cyber_Security_Channel


GDPR, EU AI Act Will Overlap as Businesses Face Enforcement

DPAs function as independent public authorities that monitor and enforce the EU's data protection law, which governs data privacy and security and grants data rights to individuals.

While the GDPR focuses on data, DPAs can pursue investigations tied to technology such as artificial intelligence.

The newly adopted EU AI Act provides more comprehensive AI regulation, asking companies to categorize their AI systems into different risk levels and produce impact assessments.

The EU AI Act also asks member states to establish governing bodies to oversee the law's implementation.

Meanwhile, DPAs have already brought multiple AI-related enforcement actions against companies under the GDPR, and some DPA members are advocating that the DPAs should serve as EU AI Act enforcers as well, given how the GDPR and the EU AI Act could overlap in some ways.

Cyber_Security_Channel


IHG Develops Travel Planner Powered by Google Cloud AI

Google Cloud became IHG’s cloud provider in 2022, when IHG migrated components of its data to BigQuery, a fully managed, serverless data warehouse.

IHG's selection of Google Cloud's AI technology for its upcoming Trip Planner feature was based on a variety of factors, including Google Cloud’s suite of AI technologies that IHG can grow with, and Google’s broad ecosystem of consumer products and services that will enable opportunities to create personalized experiences for travelers.

Google Cloud’s approach to cybersecurity, data governance and privacy also allows IHG to retain control over its data and enables data and applications to meet compliance and security standards, a key priority for IHG.

Cyber_Security_Channel


SentinelOne® Revolutionizes Cybersecurity with Purple AI

SentinelOne is the leader in AI-powered security.

SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy and simplicity.

Leading enterprises including Fortune 10, Fortune 500, and Global 2000 companies, as well as prominent governments, trust SentinelOne to secure tomorrow.

Cyber_Security_Channel


Elon Musk Faces Brazil Supreme Court Inquiry; US Lawmakers Strike Deal on Data Privacy; Retail Sales Soar in Singapore

Justice Moraes asserted that Musk had launched a disinformation campaign against the Supreme Court.

If X fails to comply with his order, the platform will be fined 100,000 reais per day, equivalent to £15,670.

The bill would not ban targeted advertising, but would give consumers the option to opt out of it.

The lawmakers leading the proposed change hope to advance the legislation soon.

Cyber_Security_Channel


Google Cloud, AI Event Kicks Off With Expanded Palo Alto Cybersecurity Pact

Amid the emergence of generative AI — which can generate text, images, sounds and video — tech companies are racing to build training models that use proprietary company data.

Google aims to license its Gemini large language model to enterprises and governments globally.

Microsoft's (MSFT) generative AI partnership with startup OpenAI has given its cloud computing business a boost.

Amazon Web Services, part of Amazon.com (AMZN), is the biggest provider of cloud services.

Cyber_Security_Channel


Companies Line Up to Undercut Key Data Privacy Law

The law allows law enforcement officials such as judges, police officers and prosecutors to request companies stop sharing information such as their home address and phone number.

It also allows the officials to sue companies that don’t comply.

Data brokers have come under fire by privacy advocates and lawmakers in recent years, but the New Jersey law is one of the few laws passed to regulate them, and perhaps the toughest.

While some states now require data brokers to delete people’s information upon request, the lack of enforcement and the difficulty for consumers to opt out often allows data brokers to maintain the status quo.

Cyber_Security_Channel


The Real Battle for Data Privacy Begins When You Die

The people we love will die, but their data will continue to live indefinitely, digital ghosts in the cloud.

At the moment, there’s nothing stopping the Metas and Googles of the world from exploiting them—or perhaps worse, erasing them permanently.

Facebook turns death reported account as “memorialized account.”According to the company’s policy at the time, no one could access memorialized accounts, even with a password.

Facebook’s “memorialized” accounts, which turn the profile into a tribute page where friends can visit and post, are designed to be static.

In 2015 the company added a feature that allows a user to arrange for a “legacy contact” to manage the page after the account holder’s death.

But the contact can’t log in or read messages; they are able to curate tribute posts or request that accounts be removed.

Cyber_Security_Channel


Apple Could Get Its Wish for a Federal Privacy Law by the End of This Year

US companies can collect and store any personal data about you they like, provided they disclose this fact in their privacy policy – which can be worded in extremely general terms.

A key compromise on the Democrat side is that small businesses are exempt from the law, so long as they don’t sell customer data to third parties.

Cyber_Security_Channel


Why Hub Cyber Security Shares Are Skyrocketing Today

Hub Cyber Security said in a press release that this strategic financing is part of the company’s ongoing effort to fortify its financial foundation and strategically invest in its future.

The company announced the successful acquisition for cash of Qpoint Technologies. “Acquiring QPoint is not just a transaction; it’s a strategic move deeply embedded in our long-term vision,” Hershcoviz (CEO) added.

There is a significant cross-selling opportunity between QPoint and Hub Cyber Security’s expanded offerings, with customers spanning the healthcare, government, energy, defense, and financial sectors.

Cyber_Security_Channel


The 20 Hottest AI Cybersecurity Companies: The 2024 CRN AI 100

GenAI is making a particularly big splash for providers of security operations tools, where the ability to replace manual processes with natural language queries promises to offer a huge boost to productivity and effectiveness.

Cyber_Security_Channel


Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

The disclosure comes more than two months after the GrapheneOS team revealed that forensic companies are exploiting firmware vulnerabilities that impact Google Pixel and Samsung Galaxy phones to steal data and spy on users when the device is not at rest.

-----

📷 Image Credit: The Independent

Cyber_Security_Channel


AI's Dual Role in SMB Brand Spoofing

However, AI is not just a tool in the attacker arsenal. Security architects are fighting back by designing security tools that use AI to detect and block impersonation attacks.

This gives organizations, especially SMBs with limited budgets and resources, a boost in their abilities to fight back.

Cyber_Security_Channel


Authy vs Google Authenticator: Two-Factor Authenticator Comparison

Twilio’s Authy is a mobile two-factor authentication app that strengthens online security by sending a one-time password to your mobile or desktop device.

It directly syncs with websites and services to grant user access and is completely free.

Cyber_Security_Channel

20 last posts shown.