Cobalt tapped a longtime cybersecurity product leader as its next chief executive as the company expands its footprint from penetration testing to offensive security. The vendor tasked Sonali Shah with further expanding Cobalt's platform, which now includes dynamic application security testing.
The NIS2 Directive focuses on addressing gaps and strengthening the security of network and information systems across the European Union. NIS2 mandates rapid incident reporting and holds senior management accountable for cybersecurity, shifting responsibilities to the board level.
Recent developments suggest the U.S. is taking a more serious approach to holding faster payments platforms accountable for scams. It's unlikely any changes will occur before the November U.S. election, but the move toward more regulation is a good start, said Ken Palla, retired MUFB Bank director.
Two months after RansomHub claimed to have published 100GBs of its stolen data on the dark web, the Florida Department of Health is notifying citizens that their sensitive information has been compromised. The attack affected the vital statistics system used to issue birth and death certificates.
This week, an ex-Verizon employee pleaded guilty, SonicWall fixed critical flaws,South Korean hackers exploited a zero-day, U.S. retailer Dick's Sporting Goods was breached, the U.S. government offered a big reward, Grok AI will send election queries to Vote.gov, and HIPAA is 28 years old.
This week, the SEC sent OpenSea a Wells notice, WazirX sought protection from creditors, Ryan Salame reconsidered his guilty plea, objections to the FTX bankruptcy reorganization plan were filed, U.S. police recovered pig-butchering scam funds, and Colombia accused Worldcoin of privacy violations.
ISMG's Virtual AI Summit brought together cybersecurity leaders to explore the intersection of AI and security. Discussions ranged from using AI for defense to privacy considerations and regulatory frameworks and provided organizations with valuable insights for navigating the AI landscape.
CEO George Kurtz said CrowdStrike has blunted the business impact from the massive July 19 outage and is implementing changes to prevent a repeat occurrence. CrowdStrike is boosting the resilience of its Falcon platform through improved content visibility and control and enhanced quality assurance.
Cisco announced its intent to acquire Robust Intelligence to fortify the security of AI applications. With this acquisition, Cisco aims to address AI-related risks, incorporating advanced protection to guard against threats such as jailbreaking, data poisoning and unintentional model outcomes.
Microsoft says it fixed a security flaw in artificial intelligence chatbot Copilot that enabled attackers to steal multifactor authentication code using a prompt injection attack. Security researcher Johann Rehberger said he discovered a way to invisibly force Copilot to send data.
Remote and hybrid work environments are here to stay - but so are the headaches caused by legacy VPN, which can lead to security vulnerabilities, rising costs and poor user experience. By adopting zero trust principles, enterprises can move past these risks, reduce costs and improve productivity.
Some dentists don't have much to smile about these days when it comes to cyberattacks. More than 1.2 million of their patients have had their sensitive data compromised in at least two dozen hacks and other breaches so far in 2024, including several incidents reported in the past month.
A joint advisory from the FBI and Cybersecurity and Infrastructure Security Agency, as well as reports published Wednesday by Microsoft and the Google-owned cybersecurity firm Mandiant, are all warning of emerging cybersecurity threats associated with the Iranian regime.
French authorities charged Telegram CEO and owner Pavel Durov with a slew of offenses including complicity with hacking, child sexual abuse material and refusal to cooperate with law enforcement authority requests for intercepted communications.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.