LLMs Are a New Type of Insider Adversary

October 15, 2024 at 10:01AM Security teams recognize large language models (LLMs) as essential business tools, but their manipulation risks call for heightened caution. Vulnerabilities can lead to unauthorized actions, exposing sensitive data and causing significant breaches. Enterprises must adopt a proactive “assume breach” mindset, implementing strict access controls, data sanitization, and sandboxing to mitigate … Read more

Controversial Windows Recall AI Search Tool Returns With Proof-of-Presence Encryption, Data Isolation

September 27, 2024 at 01:46PM Microsoft has revamped the controversial Windows Recall feature with enhanced security measures, including proof-of-presence encryption and anti-tampering checks. The AI-powered technology, which creates a searchable digital memory of user activity, will now be turned off by default and comes with tools for permanent deletion. The redesign aims to address privacy … Read more

Akira Ransomware: Lightning-Fast Data Exfiltration in 2-Ish Hours

July 11, 2024 at 05:44PM Akira ransomware attackers have shown a significant decrease in the time it takes to steal data, managing to siphon off information from a Latin American airline in just over two hours. Using SSH protocol, the threat actor gained access via an unpatched Veeam backup server and swiftly began exfiltrating data … Read more

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

January 8, 2024 at 04:27AM Digital expansion increases the external attack surface, exposing organizations to cyberthreats. Traditional security tools such as firewalls and VPNs contribute to this vulnerability. External Attack Surface Management (EASM) is a growing priority, with zero trust security being a key solution to minimize the attack surface. Join the webinar with Zscaler … Read more