5 Cloud Security Challenges Solved by CNAPP

Credit to Author: Michael Langford| Date: Tue, 14 Feb 2023 00:00:00 +0000

Configuration errors are a major cause of cloud security challenges for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Read more

Addressing cybersecurity at the board level with Difenda and Microsoft

Credit to Author: Christine Barrett| Date: Tue, 14 Feb 2023 17:00:00 +0000

Learn how business leaders can utilize managed extended detection and response, powered by the Microsoft Security product portfolio, to make informed decisions and prioritize investments in cybersecurity at the board level.

The post Addressing cybersecurity at the board level with Difenda and Microsoft appeared first on Microsoft Security Blog.

Read more

How to use Apple’s advanced iCloud security tools

Apple recently rolled out new iCloud security features that could help protect mobile professionals when they’re on the road. The features include better iCloud data security, improved iMessage security, and more.

Here is how to use these new iCloud protections.

Secure your digital assets

No one should doubt that protecting personal or enterprise data has become more important than ever. Apple introduced Lockdown Mode for iCloud in 2022, following this up with even more protections in December and, most recently, introducing free privacy and security sessions in Apple retail stores in 2023.

To read this article in full, please click here

Read more

Consent to gather data is a “misguided” solution, study reveals

Categories: News

Categories: Privacy

Tags: Annenberg School for Communication

Tags: University of Pennsylvania

Tags: informed consent

Tags: digital consent

Tags: Americans Can’t Consent to Companies’ Use of Their Data

Tags: Lina M. Khan

Tags: Federal Trade Commission

Tags: Paul Schwartz

Tags: Neil Richards

Tags: Woodrow Hartzog

Tags: Robert Levine

Tags: Joseph Turow

There’s a flaw in the notice-of-consent approach, and this is evident in the stark gap in knowledge noted by a recent study by the Annenberg School for Communication in Pennsylvania.

(Read more…)

The post Consent to gather data is a “misguided” solution, study reveals appeared first on Malwarebytes Labs.

Read more

French law to report cyberincidents within 3 days to become effective soon

Categories: News

Tags: France

Tags: law

Tags: 72 hours

Tags: cyberincident

Tags: insurance

A French law has been announced that requires victims of a cyberincident to report within 72 hours after discovery. We have heard similar proposals that may come through

(Read more…)

The post French law to report cyberincidents within 3 days to become effective soon appeared first on Malwarebytes Labs.

Read more

CISA issues alert with South Korean government about DPRK’s ransomware antics

Categories: News

Categories: Ransomware

Tags: CISA

Tags: ransomware

Tags: Democratic People’s Republic of Korea

Tags: DPRK

Tags: North Korea

Tags: WannaCry

Tags: EternalBlue

Tags: Lazarus Group

Tags: APT

Tags: Magniber

Tags: Magnitude exploit kit

Tags: exploit kit

Tags: EK

Tags: Andariel

Tags: Silent Chollima

Tags: Stonefly

Tags: Maui

Tags: H0lyGh0st

Tags: PLUTONIUM

Tags: Conti

The tactics of North Korean-sponsored ransomware cyberattacks against the healthcare sector and other vital infrastructure are highlighted in the latest #StopRansomware alert.

(Read more…)

The post CISA issues alert with South Korean government about DPRK’s ransomware antics appeared first on Malwarebytes Labs.

Read more

Jailbreaking ChatGPT and other large language models while we can

Categories: News

Tags: ChatGPT

Tags: DAN

Tags: Bing Chat

Tags: Chinese

Tags: large language model

Tags: jailbreak

Large language models like ChatGPT are now being tested by the public and, no surprise here, researchers are finding ways to jailbreak the systems

(Read more…)

The post Jailbreaking ChatGPT and other large language models while we can appeared first on Malwarebytes Labs.

Read more