Recent Security News
-
Microsoft Copilot for Security prepares for April liftoff
March 13, 2024 at 12:07PM Microsoft Copilot for Security, a subscription AI security service, will be available on April 1, 2024. The service provides generative AI in standalone and embedded modes and is based on GPT-4 and a Microsoft security-specific model. It aims to defend at machine speed, reduce security talent shortage, and improve productivity.…
-
Healthcare’s Ransomware Epidemic: Why Cyberattacks Hit the Medical Sector With Alarming Frequency
March 13, 2024 at 10:45AM Ransomware attacks on the healthcare sector continue and are unlikely to decrease due to the industry’s susceptibility to exploitation. The sector’s reliance on diverse OT devices controlled by IT systems over WiFi, coupled with challenges in patching and device management, poses a significant security risk. Segmentation is recommended to mitigate…
-
White House Budget Proposal Seeks Cybersecurity Funding Boost
March 13, 2024 at 10:45AM The White House has released a $7.3 trillion budget proposal for fiscal year 2025, emphasizing increased cybersecurity spending. This includes specific allocations such as $13 billion across civilian departments, $3 billion for the cybersecurity agency CISA, and additional funding for the Justice Department and healthcare sector. The budget also addresses…
-
Why You Need to Know Your AI’s Ancestry
March 13, 2024 at 10:33AM AI is rapidly transforming daily life but can be used for good or harm. Data quality is crucial as bad data leads to cybersecurity vulnerabilities and misinformation. Secure-by-design and curated data training are proposed solutions. The urgency to address AI security is emphasized, as it impacts critical systems and national…
-
PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users
March 13, 2024 at 10:09AM PixPirate Android banking trojan utilizes new method to elude detection and steal sensitive data in Brazil. The malware hides its icon from the victim’s device, making the operations inconspicuous. Employing SMS and WhatsApp, it uses a downloader app to install and execute its main fraudulent activities, posing a significant threat…