The integration of Oxeye into GitLab’s suite marks a significant leap in the accuracy and efficiency of security scans, directly addressing the challenge of false positives in static application security testing and enhancing software security across development stages, according to GitLab.
A Russian hacking group is targeting German political parties as part of a Moscow-backed espionage campaign. The latest APT29 campaign marks the first time the group has been seen targeting political organizations, according to researchers at Mandiant.
A nursing home operator is seeking bankruptcy protection, citing the effects of a ransomware attack last fall and fallout from the recent Change Healthcare outage as factors that contributed to its financial woes. Also, a Senate bill aims to address cash flows for some health firms hit by an attack.
The 2024 Economic Report of the President includes a chapter on artificial intelligence that warns of the risks associated with AI-fueled job displacement and discrimination. The report also highlights the benefits associated with the federal government harnessing AI tools.
In the latest weekly update, four editors discussed ISMG's plans for in-depth and diverse coverage at the 2024 RSA conference, the latest guidance on web trackers from federal regulators and the latest forecasts on quantum computing - and why security teams should care.
Ongoing, rapid advances in generative artificial intelligence tools and large language models, including fewer barriers to illicit use, presage their increased use by cybercriminal and nation-state cyber operators to bolster sophisticated operations, cybersecurity officials and insurers warn.
Technology practitioners, business leaders and industry experts gathered for the inaugural CIO Business Transformation Awards and Summit this month in New Delhi, India. The ISMG event, hosted by CIO.inc, recognized the remarkable strides CIOs have made in business transformation.
Gartner Director Analyst Tisha Bhambry and data security adviser and vCISO Jatinkumar Modh discuss the workplace challenges CISOs face and how an emerging group of virtual CISOs can offer fresh perspectives and solutions to organizations that lack cybersecurity resources.
A likely Chinese hacker-for-hire used high-profile vulnerabilities in a campaign targeting a slew of Southeast Asian and U.S. governmental and research organizations, says threat intel firm Mandiant. Rapid exploitation of newly patched flaws has become a hallmark of Chinese threat actors.
The South Korean government is investing $585 million in domestic AI research and development in 2024, but spending cuts, a shrinking technology workforce and growing competition with other APAC countries pose challenges to the government's goal of "global technology domination."
The U.S. Department of Justice in a lawsuit filed Thursday is accusing Apple of discarding user security and privacy protections as part of a broader effort to maintain dominance in the national smartphone market. A spokesperson for the tech giant told ISMG the lawsuit threatens the entire company.
Skyhigh Security snagged longtime Cloudera and Splunk executive Vishal Rao as its next CEO to capture more opportunities in the growing security service edge market. Rao replaces Gee Rittenhouse, who left the company Feb. 29 to become AWS' vice president for security services.
Artificial intelligence technologies such as generative AI are not helping fraudsters create new types of scams. They are doing just fine relying on the traditional scams, but the advent of AI is helping them scale up attacks and snare more victims, according to researchers at Visa.
The United Nations on Thursday unanimously adopted a U.S.-brokered first-ever international resolution promoting the safe use of artificial intelligence. The adoption of the resolution comes at a time when governments are vying to exert influence and lead global governance in the nascent technology.
A new type of denial-of-service threat can disrupt an estimated 300,000 internet hosts that are at risk of exploitation. Researchers at the CISPA Helmholtz Center for Information Security say attackers are using IP spoofing to entangle two servers in a perpetual communication loop.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.