Meta will slap a "made with AI" label on generative artificial intelligence content posted on its social media sites starting in May, a change the social media giant says will result in more content carrying a warning for users. The company will look for "industry standard AI image indicators."
A second cybercriminal gang - RansomHub - is trying to shake down Change Healthcare's parent company, UnitedHealth Group, and have it pay another ransom for data that an affiliate of ransomware-as-a-service group BlackCat claims to have stolen in February. Is this the latest ruse in a messy attack?
The U.S. Environmental Protection Agency is investigating claims that a notorious government hacker leaked a trove of contact information from the agency's database of critical infrastructure contractors. A spokesperson said the agency conducted a "preliminary analysis" of the allegedly leaked data.
Zero trust architecture is a strategic pivot for safeguarding sensitive data. MarketsandMarkets' Rahul Mergu, who recently won ISMG's Dynamic CISO Award for his zero trust implementation, discusses the inadequacies of conventional VPN solutions that pushed him to adopt a zero trust architecture.
Foundations housing seven large open-source projects are banding together ahead of what they say is a nearly impossible 2027 deadline created by Europe's Cyber Resilience Act - the world's first digital supply chain regulation. European Union lawmakers approved the act in March.
"The Art of Possible" is the theme of RSA Conference 2024, and event organizers Linda Gray Martin and Britta Glade say they may have put together the best agenda yet - featuring sessions and speakers on red-hot topics such as identity security, cloud, gen AI and operational technology.
British police are investigating attempts to target Members of Parliament, their advisers and other Conservative and Labour insiders via spear-phishing messages as part of an apparent honeytrap sexting scam. Experts say low-tech attacks based on social engineering remain difficult to detect.
Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.
Vietnamese financially motivated hackers are targeting businesses across Asia in a campaign to harvest corporate credentials and financial data for resale in online criminal markets. Researchers at Cisco Talos identified a cluster of hacking activity its tracks as CoralRaider.
Security researchers are warning about a relatively new malware called Latrodectus, believed to be an evolutionary successor to the IcedID loader. It has been detected in malicious email campaigns since November 2023, and recent enhancements make it harder to detect and mitigate.
As recovery from its Feb. 21 cyberattack continues, Change Healthcare and its parent company UnitedHealth Group are facing a growing pile of lawsuits, while health sector entities affected by the IT services disruption are dealing with a mounting stack of bills and other paperwork to catch up on.
Generative artificial intelligence is good at sounding authoritative - even when it's making stuff up. One community that thinks so-called AI hallucinations are actually a good thing: hackers. Especially when developers use AI tools that hallucinate entire software libraries.
A Filipino hacktivist group broke into servers owned and operated by the government's Department of Science and Technology and stole up to 25 terabytes of confidential data and backups. The hacking incident followed a series of successful cyberattacks against government agencies.
As security and technology leaders look to reduce the complexity of their environments and condense the number of core vendors in their ecosystems, the power of platform solutions grows. John Maddison of Fortinet opens up on the power of convergence in a single operating system.
In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.