Cybersecurity Tools

Navigating the Cybersecurity Risks of AI Assistants in Video Conferencing

AI Digital Assistants are becoming more popular plugins for video conferencing platforms like Microsoft Teams and Zoom. However, they come with a cost to data privacy and a risk of divulging critical information that might be regulated, intellectual property, or even non-public personal information. While the service terms and privacy policies claim de-identification of sensitive data, how would you de-identify the recipe for Coke, or the critical parts of your widget you’re building? There is an enormous risk that people may not understand we want to bring to light.
Cybersecurity Tools

The Week in Cyber Security and Data Privacy: 11 – 18 December 2023

Welcome to this week’s round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. We’re also introducing two new categories this week: ‘AI’ and ‘Key dates’. Publicly disclosed data breaches and cyber attacks: in the spotlight Mr. Cooper reveals 14,690,284 people affected in October breach The largest mortgage provider in the US, Nationstar Mortgage LLC, operating under the name Mr. Cooper, says its investigation into an October cyber attack has uncovered

The post The Week in Cyber Security and Data Privacy: 11 – 18 December 2023 appeared first on IT Governance UK Blog.

Cybersecurity Tools

An interview with CISO Mardecia Bell, a storied career

EXECUTIVE SUMMARY: In this edited interview excerpt from the CISO’s Secrets podcast, CISO Mardecia Bell unpacks what it’s like to serve as an information security expert on a university campus. A highly accomplished CISO, over the course of her storied, 38-year career at the North Carolina State University, she has smartly built up systems, implemented […]

The post An interview with CISO Mardecia Bell, a storied career appeared first on CyberTalk.

Cybersecurity Tools

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Overview: Batloader is not a new malware in the series – it is an emerging one. In our previous blogs, we discussed how Batloader can deploy different types of malware, including stealers and ransomware. We also delved into its role as an initial access gainer, and highlighted its highly evasive nature, along with its ability […]

The post Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities

By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital world, the safety of our children on the internet has […]

The post Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities appeared first on Cyber Defense Magazine.

Cybersecurity Tools

Ukraine’s Largest Telecommunication Provider Paralysed by a Massive Cyberattack

Kyivstar, Ukraine’s main provider of telecommunication services, says that it’s been the target of a ‘powerful hacker attack’. The attack left customers without mobile or internet signal and caused the air raid sirens in the northeastern city of Sumy to malfunction as a result of the outage. Kyivstar has over 25 million mobile customers and […]

The post Ukraine’s Largest Telecommunication Provider Paralysed by a Massive Cyberattack appeared first on Heimdal Security Blog.

Scroll to Top