This week's roundup includes an update on the Tornado Cash case, a proposal for a law-abiding crypto mixer, August hack numbers, Stake's resumption of operations, Binance's delisting of privacy coins in Belgium and a court order against the CEO of Celsius.
Ransomware groups do whatever they can to pressure a victim into paying. Enter the likes of Ransomed, following in the footsteps of Alphv/BlackСat, NoEscape and Good Day-powered Cloak, all of which threaten victims with a world of General Data Protection Regulation violation pain unless they pay.
Check Point Software will buy a SaaS security startup founded by former Armis leaders to anticipate and block threats from malicious applications. The deal will give clients a better understanding of the SaaS platforms - such as Office 365, Salesforce and GitHub - that power their business.
Artificial intelligence holds the potential to undermine trust in democracy - but overwrought warnings themselves can erode trust in the system critics seek to preserve, warns a cybersecurity firm. AI is "a long way from massively influencing our perception of reality and political discourse."
Zscaler's ability to inspect traffic in-line and secure application-to-application communications has driven massive growth in its data protection business, CEO Jay Chaudhry said. Customers have embraced Zscaler's data protection technology over incumbents such as Symantec as well as CASB tools.
The Dutch privacy regulator says imminent artificial intelligence regulation in the European Union may fail to prevent the rollout of dangerous algorithms. Europe is close to finalizing the AI Act, but citizens of the Netherlands "should not expect miracles," the regulator said.
Regulatory scrutiny over artificial intelligence will only mount, warns consultancy KPMG in a report advising companies to proactively set up guardrails to manage risk. Even in the absence of regulatory regimes, "companies must proactively set appropriate risk and compliance guardrails."
IronNet's board authorized the company to furlough nearly all its workers and substantially curtail business operations as the board evaluates seeking bankruptcy protection. The furlough and cessation of business operations constitute an event of default under the terms of the company's borrowing.
GrammaTech has separated its security software products and cyber research services divisions, and venture capital firm Battery Ventures has acquired the former and renamed it CodeSecure. The Washington, D.C.-area application security testing software business will pursue M&A in adjacent markets.
A startup founded by the longtime leader of Secdo and backed by the likes of Qumra Capital and Accel could soon be acquired by Tenable. The company is in advanced negotiations to purchase cloud infrastructure security startup Ermetic in a deal valued at between $300 million and $350 million.
The U.K. plans to hold its first-ever global summit on artificial intelligence this November. Goals of the event include detailing AI risks and opportunities, building effective frameworks for using AI safely, and setting international standards to manage AI risks and enforce norms.
Join Cisco experts as they talk about what effective automation looks like, what automation in the world of XDR really means, and why it’s vital for you to start using
Has the cry of the Qakbot come to an end? While the pernicious, multifunction malware fell quiet last week thanks to Operation "Duck Hunt," lucrative cybercrime operations have a history of rebooting themselves. Rivals also offer ready alternatives to ransomware groups and other criminal users.
Multiple hackers are minting newer capabilities from an open-source information stealer to spawn new variants. The malware steals sensitive information such as corporate credentials, which are resold to other threat actors for attacks, including operations related to espionage or ransomware.
Threat actors are manipulating the technology behind large language model chatbots to access confidential information, generate offensive content and "trigger unintended consequences," warns the U.K. National Cyber Security Center. Prompt injection attacks are "extremely difficult" to mitigate.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.