Apple: 2.5B Records Exposed, Marking Staggering Surge in Data Breaches

December 8, 2023 at 05:34PM An Apple-commissioned report emphasized the importance of end-to-end encryption in safeguarding sensitive data amidst a significant surge in data breaches and compromised records. The study underscored the rise in ransomware campaigns and vendor attacks as contributors to the worsening data security landscape. The report also highlighted the challenges and complexities … Read more

Privilege elevation exploits used in over 50% of insider attacks

December 8, 2023 at 12:20PM Insider threats using privilege escalation flaws are on the rise, with 55% of incidents relying on privilege escalation exploits and 45% introducing risks through downloading risky tools. Crowdstrike reports that insider attacks cost an average of $648,000 for malicious and $485,000 for non-malicious incidents. Additionally, introducing flaws into networks increases … Read more

Meta Makes End-to-End Encryption a Default on Facebook Messenger

December 7, 2023 at 10:42PM Facebook Messenger now defaults to end-to-end encryption, ensuring only the sender and recipient can read messages, not even Meta itself. Key Takeaways from Meeting: 1. End-to-End Encryption has been implemented in Facebook Messenger as a default feature. 2. As a result of this encryption, messages can only be read by … Read more

Yet another UK public sector data blab, this time info of pregnant women, cancer patients

December 7, 2023 at 07:46AM Over 22,000 patients’ data were exposed by Cambridge University Hospitals NHS Foundation Trust due to errors responding to Freedom of Information requests. Maternity and cancer patient details were inadvertently revealed. The Trust has since audited past FoI responses, improved data security measures, and is cooperating with the ICO. Meeting Takeaways: … Read more

DTEX Systems Appoints Mandiant Global CTO Marshall Heilman As CEO

December 6, 2023 at 06:22PM DTEX Systems has appointed cybersecurity veteran Marshall Heilman as CEO to enhance its insider risk management and accelerate global growth. Heilman’s vast experience is set to strengthen the company’s proactive approach to preventing data loss amid an increasing demand for its InTERCEPTâ„¢ platform and expansion in critical industries. **Meeting Takeaways:** … Read more

Locking down the edge

December 6, 2023 at 11:18AM Edge security challenges are escalating as more functions decentralize, increasing the attack surface at network edges. Sectors like healthcare and energy lack dedicated IT security, risking severe breaches. Dell’s webinar tackles this with a Zero Trust strategy, promoting constant verification and automated protection through its NativeEdge platform. Meeting Takeaways: – … Read more

New Report: Unveiling the Threat of Malicious Browser Extensions

December 6, 2023 at 06:54AM Browser extensions present high-risk vectors for cyber-attacks, exploiting users’ trust through three types: initially malicious, compromised, and risky due to excessive permissions. The LayerX report highlights this threat and recommends vigilance in installation methods and identifying signs of potential harm, emphasizing the need for educated choices and robust security protocols … Read more

5 Critical Steps to Prepare for AI-Powered Malware in Your Connected Asset Ecosystem

December 6, 2023 at 06:18AM AI-powered attacks are on the rise, necessitating a comprehensive security strategy beyond mere incident management, as discussed in SecurityWeek’s article “5 Critical Steps to Prepare for AI-Powered Malware in Your Connected Asset Ecosystem.” Meeting Takeaways: 1. It is anticipated that AI-powered attacks will become increasingly prevalent. 2. Adopting a comprehensive … Read more

Shielding the data that drives AI

December 6, 2023 at 05:27AM Organizations must prioritize securing critical data and IT infrastructure against a growing threat landscape and stringent regulations. Intel’s confidential computing, featuring in their 4th Generation Xeon processors, offers encryption-based protection for AI-powered applications, ensuring data security in storage, transit, and processing, while enabling regulatory compliance. Meeting Takeaways: 1. Prioritization: Organizations … Read more

Keeper Security Survey Finds 82% of IT Leaders Want to Move Their On-Premises Privileged Access Management (PAM) Solution to the Cloud

December 5, 2023 at 06:55PM Keeper Security’s report highlights IT leaders’ preference for cloud-based over on-premises Privileged Access Management (PAM) solutions due to cost and complexity concerns. 82% favor moving PAM to the cloud for better security and efficiency. The report also emphasizes the need for zero-trust and zero-knowledge cybersecurity in the current economic climate. … Read more