Source-code

70 percent of DevSecOps professionals can't identify AI source code origins

Almost 70 percent of DevSecOps professionals can't detect AI source code origins, creating massive security risks, according to a new report.

The study from JFrog finds the majority of software developers and cybersecurity teams are lacking well-defined AI and Machine Learning (ML) source code usage visibility, provenance, and governance, leaving many organizations at risk.

By Ian Barker -
Nerd Robot hacker with blue binary code on background

Automated bot attacks surge ahead of US election

Automated bot attacks targeting social media platforms have surged in the lead-up to the US presidential election, with the sector accounting for 28 percent of all attacks in Q3, up from just three percent in Q1.

The latest identity fraud report from AU10TIX shows an increasing industrialization of identity fraud, with bad actors launching automated mega-attacks using thousands of false identities targeting payments, crypto and social media companies all over the world.

By Ian Barker -
Business login

Identity system modernization held back by 'technical debt'

Modernizing identity systems is proving difficult for organizations due to two key challenges, decades of accumulated identity and access management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs).

A new report from Strata Identity and the Cloud Security Alliance (CSA) finds incompatibility with non-standard, legacy applications is a barrier to deploying advanced application authentication for 71 percent of respondents, further highlighting the issue of technical debt with 54 percent of respondents citing it as their top hurdle when modernizing their IAM architecture.

By Ian Barker -
Domain name fake

Enterprises vulnerable to look-alike domains

According to a new report, 80 percent of registered web domains that resemble a Global 2000 brand do not actually belong to that brand.

The report from enterprise-class domain registrar CSC shows that of the homoglyph (look-alike fake) domains owned by third parties other than the Global 2000 brand owners, 42 percent have MX records (email exchange records) compared with 40 percent in 2023. These MX records can be used to send phishing emails or to intercept email.

By Ian Barker -
EU security NIS2

Compliance with NIS2 comes at a cost

With the EU's NIS2 directive now starting to roll out, aiming to achieve a high level of cybersecurity across member states, a new survey commissioned by Veeam shows the significant impact implementation is having on businesses.

The study, carried out by Censuswide, reveals that while 68 percent of companies report receiving the necessary additional budget for NIS2 compliance, 20 percent identify budget as being a significant barrier to achieving compliance.

By Ian Barker -
women having problem buying on line

Shoppers willing to hand over personal data to get a holiday bargain

A new survey from Norton shows that 60 percent of UK holiday shoppers say they are swayed by good holiday deals and nearly two-thirds (61 percent) give away their personal information to receive a discount when shopping.

The study reveals that 70 percent of Brits have tried to secure discount codes, through means like signing up to a website's mailing list or answering a survey. 61 percent of those who tried to secure discounts admit to divulging their personal information to do so.

By Ian Barker -
API

Will AI transform how we secure APIs? [Q&A]

Digital services, including Generative AI, rely heavily upon Application Programming Interfaces (APIs) to access and relay data. But securing these conduits can be difficult so is this a problem that AI could help solve?

We spoke to James Sherlow, systems engineering director, EMEA, at Cequence Security, to find out how Generative AI might be used to address API security.

By Ian Barker -
Identity impersonation

New solution helps prevent account takeovers

Account takeover attacks have increased 24 percent in the second quarter of 2024 compared to the same period last year, according to AI-powered anti-fraud platform Sift.

Account takeovers accounted for losses of almost $13 billion in 2023. To combat the problem Sift’s latest quarterly product update feature an enhanced solution to protect businesses from ATO fraud throughout the entire consumer journey.

By Ian Barker -
Software supply chain blockchain

Software supply chain attacks and how to deal with them [Q&A]

Software supply chain attacks have increasingly made the headlines in recent years. They occur when attackers change the code in third-party software components in order to compromise the applications using them.

These attacks can be used to steal data, corrupt systems or move laterally through networks. We spoke to Ansh Patnaik, chief product officer at CyCognito, to learn more about this type of attack and how to combat it.

By Ian Barker -
Google magnifier

Google launches new AI risk assessment tool

Last year Google launched its Secure AI Framework (SAIF) to help people safely and responsibly deploy AI models.

Today it's adding to that with a new tool that can help others assess their security posture, apply these best practices, and put SAIF principles into action.

By Ian Barker -
Robot hacker

Free dark web reports reveal organizations'exposed information

Most cyberattacks are carried out using compromised credentials, but it can be hard for businesses to know if their information has been leaked.

In order to make it easier to discover leaked data, Quadrant Information Security is launching a free Dark Web Reports service offering insights into compromised credentials and leaked information and actionable advice on how to address them.

By Ian Barker -
JavaScript

Third-party JavaScript tags put security at risk

While businesses understand that third-party JavaScript tags collect information, only 13 percent are confident they understand what information they collect and only 26 percent are aware that tags can leak their private user data to other organizations.

A new report from the Jscrambler platform for client-side protection, with research conducted by Dimensional Research, shows 97 percent of respondents say they know that third-party tags collect sensitive or private information regularly.

By Ian Barker -
Shrugging businessman

Employees lack fundamental security awareness

Many executives are concerned about their employees' level of cyber risk awareness, with a new survey showing that 70 percent believe their employees lack critical cybersecurity knowledge, up from 56 percent in 2023.

The study, of 1,850 executives across 29 countries, from Fortinet also shows that over 60 percent of respondents expect more employees to fall victim to attacks in which cybercriminals use AI.

By Ian Barker -
Apps SaaS

Majority of SaaS applications and AI tools are unmanaged

A new report reveals that 90 percent of SaaS applications and 91 percent of AI tools within enterprises remain unmanaged, suggesting a widespread vulnerability that continues to grow.

The study from Grip Security highlights the limitations of traditional security strategies in combating 'SaaS risk creep' the number of SaaS applications used in an enterprise increased by 40 percent over the last two years.

By Ian Barker -
Cloud network security

Cloud attacks grow in cost and scale

A new report from Sysdig highlights the growing cost and scale of cloud attacks and the evolution of tactics being used by attackers.

Among the findings are that over $100,000 is lost per day to AI resource jacking. It hasn't taken long for threat actors to leverage stolen cloud access to exploit large language models (LLMs), as illustrated by an LLMjacking attack that left one victim on the hook for $30,000 in just three hours. Left unchecked, an LLMjacking operation can cost more than $100,000 per day.

By Ian Barker -
Load More Articles