Quantcast
Channel: Kevin Townsend - SecurityWeek
Browsing all 132 articles
Browse latest View live

Hacker Conversations: Chris Evans, Hacker and CISO

Chris Evans, CISO and chief hacking officer at HackerOne, challenges the common perception of both hackers and their motivation. The post Hacker Conversations: Chris Evans, Hacker and CISO appeared...

View Article


Cyberinsurance Premiums are Going Down: Here’s Why and What to Expect

The change in premium rates is more likely to be the insurers’ correction than the insureds’ improvement in security. The post Cyberinsurance Premiums are Going Down: Here’s Why and What to Expect...

View Article


Hacker Stole Secrets From OpenAI

ChatGPT maker OpenAI was breached in 2023, but the company says source code and customer data were not accessed. The post Hacker Stole Secrets From OpenAI appeared first on SecurityWeek.

View Article

Supreme Court Ruling Threatens the Framework of Cybersecurity Regulation

The Supreme Court's striking down of the Chevron Doctrine will have a major effect on the determination and enforcement of cyber regulation in the US. The post Supreme Court Ruling Threatens the...

View Article

Mandiant Highlights Russian and Chinese Cyber Threats to NATO on Eve of 75th...

On the eve of NATO’s 75th anniversary summit in Washington DC, Mandiant outlines the current state of cyberthreats facing NATO and aligned countries. The post Mandiant Highlights Russian and Chinese...

View Article


Article 1

View Article

Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge?Industry...

Few people understand AI, nor how to use nor control it, nor where it is going. Yet politicians wish to regulate it. The post Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge?...

View Article

Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge?

Few people understand AI, nor how to use nor control it, nor where it is going. Yet politicians wish to regulate it. The post Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge?...

View Article


CISO Conversations: Frank Kim (YL Ventures) and Charles Blauner (Team8)

Frank Kim and Charles Blauner are responsible for security at both their own company and for the companies in which their firms invest. The post CISO Conversations: Frank Kim (YL Ventures) and Charles...

View Article


Pindrop Security Raises $100 Million to Expand Deepfake Detection...

The additional funds will be used to further the development of new tools to counter the expanding threat of AI-generated voice deepfakes. The post Pindrop Security Raises $100 Million to Expand...

View Article

Pindrop Security Raises $100 Million to Expand Deepfake Detection Technology

The additional funds will be used to further the development of new tools to counter the expanding threat of AI-generated voice deepfakes. The post Pindrop Security Raises $100 Million to Expand...

View Article

Is GhostEmperor Back? Sygnia Finds Clues in Recent Cyber Incident

Sygnia discovered what it believes to be a variant of the GhostEmperor infection chain leading to the Demodex rootkit – which was first seen and described in 2021. The post Is GhostEmperor Back? Sygnia...

View Article

Zest Security Aims to Resolve, Not Just Mitigate Cloud RisksIndustry Moves...

Zest Security emerged from stealth with $5 million funding and an AI-powered platform that resolves the root source of risk in the cloud. The post Zest Security Aims to Resolve, Not Just Mitigate Cloud...

View Article


Zest Security Aims to Resolve, Not Just Mitigate Cloud Risks

Zest Security emerged from stealth with $5 million funding and an AI-powered platform that resolves the root source of risk in the cloud. The post Zest Security Aims to Resolve, Not Just Mitigate Cloud...

View Article

Millions of Websites Susceptible to XSS Attack via OAuth Implementation Flaw

Researchers discovered and published details of an XSS attack that could potentially impact millions of websites around the world. The post Millions of Websites Susceptible to XSS Attack via OAuth...

View Article


Massive OTP-Stealing Android Malware Campaign Discovered 

Android malware can intercept and steal OTPs and login credentials, leading to complete account takeovers. The post Massive OTP-Stealing Android Malware Campaign Discovered  appeared first on...

View Article

Cost of Data Breach in 2024: $4.88 Million, Says Latest IBM StudyIndustry...

The average cost of a data breach jumped to $4.88 million from $4.45 million in 2023, a 10% spike. The post Cost of Data Breach in 2024: $4.88 Million, Says Latest IBM Study appeared first on...

View Article


Cost of Data Breach in 2024: $4.88 Million, Says Latest IBM Study

The average cost of a data breach jumped to $4.88 million from $4.45 million in 2023, a 10% spike. The post Cost of Data Breach in 2024: $4.88 Million, Says Latest IBM Study appeared first on...

View Article

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication

The ransomware scourge is still growing and still successful for attackers, Rapid7’s Ransomware Radar Report 2024 shows. The post Ransomware in 2024: More Attacks, More Leaks, and Increased...

View Article

Implement MFA or Risk Non-Compliance With GDPR

The UK Information Commissioner’s Office announced its intention to fine Advanced Computer Software Group £6.09 million. The post Implement MFA or Risk Non-Compliance With GDPR appeared first on...

View Article
Browsing all 132 articles
Browse latest View live