GitHub, Gitlab and Bitbucket affected
Aqua Security, a provider in the field of Cloud Native Security, publishes a new study showing how secret data such as login credentials, API tokens, and passkeys from organizations can remain openly accessible for years in the Git-based infrastructure of most source code management systems (SCMs).
Commentary
Since the release of ChatGPT, cybersecurity experts have been wondering how to control the falsification of GenAI. They initially assumed a threat scenario, namely that the output of GenAI is already being distorted by data poisoning.
Increase in cases of fraud
According to the Flashpoint 2024 Global Threat Intelligence Report, hackers stole an almost unbelievable amount of information in 2023 alone: 17 billion pieces of personal data were compromised. This is four times more than in the previous year and affects millions of people.
Utilizing the growing talent pool
As hackers become more skilled, the fight against cybercrime is becoming increasingly challenging. This problem transcends industry boundaries and affects small and medium-sized enterprises (SMEs), large corporations and the public sector alike.
Study
A new study by Zscaler examines the current state of implementation of NIS 2. The results of a survey of 875 IT executives in Europe show a discrepancy between the confidence of European organizations to achieve compliance with the regulations and the understanding of the requirements.
IDaaS-Plattform
Entrust announces the expansion of its portfolio: The Identity as a Service (IDaaS) platform will integrate identity verification and identity and access management into a single solution to combat deepfakes, phishing, account takeover attacks and other threats.
EU push
At a time when cyber threats are bigger and more sophisticated than ever, the European Union (EU) has taken an important step towards strengthening its digital defenses with the introduction of the Network and Information Security Directive (NIS2).
Efficient security strategy
Even the strongest IT system is only as strong as its weakest security vulnerability.
Unfortunately, the number of such vulnerabilities is constantly increasing – in fact, it has more than tripled in the last ten years.
Microsoft Research Asia recently presented an artificial intelligence called VASA-1, which is able to generate highly realistic deepfake videos from a single photo and an audio clip.
Events
Veranstaltungen
Most read articles.
23. December 2024
18. December 2024
17. December 2024
6. December 2024
25. November 2024