How to Guard Your Data from Exposure in ChatGPT

October 12, 2023 at 07:28AM A new report by LayerX highlights the risks associated with data exposure in ChatGPT and similar AI applications. The report suggests that traditional file-based data protection solutions are inadequate for handling these risks and recommends the use of browser security platforms for real-time monitoring and governance. Employee usage of GenAI … Read more

US construction giant unearths concrete evidence of cyberattack

October 12, 2023 at 07:00AM Simpson Manufacturing Company has experienced a cyberattack that has caused disruptions to its IT infrastructure and applications. The company has taken steps to contain the attack and is working on responding to and addressing the issue. It is currently unclear if the attack involved ransomware. The construction industry is increasingly … Read more

Pan-African Financial Apps Leak Encryption, Authentication Keys

October 12, 2023 at 06:26AM Researchers at Approov have discovered that encryption, authentication, and signing keys are frequently exposed in mobile fintech apps used in Africa. The study found that when the top 10 revenue and download-generating apps were reverse-engineered, passwords, API keys, and private keys for cryptography were exposed. The researchers also identified that … Read more

Generative AI Security: Preventing Microsoft Copilot Data Exposure

October 11, 2023 at 10:35AM Microsoft Copilot is an AI assistant integrated into Microsoft 365 apps that aims to improve productivity by searching and compiling data across documents, presentations, emails, and more. However, this access to sensitive data raises security concerns for information security teams. Varonis offers a Data Security Platform that can help address … Read more

October 9, 2023 at 04:11PM – ‘Looney Tunables’ Linux Flaw Sees Snowballing Proof-of-Concept Exploits

October 9, 2023 at 04:11PM Proof-of-concept (PoC) exploits for the critical buffer overflow vulnerability in the GNU C Library (glibc) have been developed, putting Linux systems at risk. The flaw, disclosed by Qualys researchers, could lead to unauthorized data access and system alterations, potentially granting attackers root privileges. Linux root takeovers are highly dangerous as … Read more