Zephyrnet Logo

Tag: attack surface

Smart Factories Use AI to Create OT and IT Security Protection

In December, we published an article talking about how more companies are using AI technology to solve a number of challenges they face. The...

Top News

Pervasive LLM Hallucinations Expand Code Developer Attack Surface

Software developers' use of large language models (LLMs) presents a bigger opportunity than previously thought for attackers to distribute malicious packages to development environments,...

Flare Acquires Foretrace to Accelerate Threat Exposure Management Growth

PRESS RELEASEMONTREAL, March 26, 2024 (Newswire.com) — Flare, a global leader in Threat Exposure Management, announced today its acquisition of Foretrace, a U.S.-based data exposure...

In the Age of ChatGPT, AI Models are Massively Popular… and Easily Compromised – Mass Tech Leadership Council

Long before 2023 ended, it had already been crowned as the year of generative AI. Spurred by the advent of models like ChatGPT that...

Security concerns in IoT: Addressing the challenges head-on | IoT Now News & Reports

Among the most transformative technologies of the digital age is the Internet of Things (IoT), which is fundamentally changing how we live, work, play...

United Arab Emirates Faces Intensified Cyber-Risk

The United Arab Emirates' focus on becoming a global hub for business and innovation is driving digital transformation in the Middle East, with the...

Red Canary Announces Full Coverage of All Major Cloud Providers

PRESS RELEASEDENVER, March 5, 2024 – Red Canary today announced full coverage of its detection and response capabilities to include all major cloud infrastructure...

Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes

A security bug in the widely used Kubernetes container-management system allows attackers to remotely execute code with System privileges on Windows endpoints, potentially leading...

NSA’s Zero-Trust Guidelines Focus on Segmentation

The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...

Increased Automotive Data Use Raises Privacy, Security Concerns

The amount of data being collected, processed, and stored in vehicles is exploding, and so is the value of that data. That raises questions...

Japan on Line Breach: Clean Up Post-Merger Tech Sprawl

Analysis by the Japanese government of a recent data breach at the widely popular Asian messaging application Line has resulted in a directive for...

It’s 10 p.m. Do You Know Where Your AI Models Are Tonight?

If you thought the software supply chain security problem was difficult enough today, buckle up. The explosive growth in artificial intelligence (AI) use is...

Securing the Digital Frontier: Effective Threat Exposure Management

AI technology is radically changing the direction of the cybersecurity sector. Companies around the world are expected to spend $102.78 billion on AI to...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?