CU InfoSecurity
Unknown date
Security
The webinar discusses the use of AI for faster and more defensible incident response. Participants learn how AI can enhance security measures and improve compliance with regulatory requirements.
CU InfoSecurity
Unknown date
Guidance
The webinar discusses the use of Explainable AI for enhancing security measures and ensuring compliance with SEC requirements. Participants will learn how to integrate these technologies effectively.
CU InfoSecurity
Unknown date
Security
• Android Trojan 'Massiv' masquerades as an IPTV app and can capture screens, overlay content, and steal credentials.
• The malware may soon be offered for sale on criminal forums as a service.
CU InfoSecurity
Unknown date
Hidden
Palo Alto Networks acquires Koi Security for $300 million to enhance AI-driven endpoint security; the acquisition adds deep visibility into AI agents, plug-ins, and nonbinary code.
CU InfoSecurity
Unknown date
Hidden
TX
Texas attorney general sues TP-Link for misrepresenting its connections to mainland China and the security of its devices; TP-Link claims rivals and competitors are conducting a smear campaign.
CU InfoSecurity
Unknown date
Hidden
Palo Alto Networks acquires Chronosphere to unify observability and security operations; the integration aims to automate remediation, optimize telemetry pipelines, and manage data volumes from cloud-native and AI workloads.
CU InfoSecurity
Unknown date
Guidance
The article emphasizes the importance of comprehensive third-party risk management and provides strategies for scaling such programs. It highlights the need for regular assessments, clear communication, and robust contract terms.
CU InfoSecurity
Unknown date
Enforcement|security
Norton Healthcare agreed to pay $11 million to settle a class action lawsuit related to a 2023 data theft attack by the Alphv/BlackCat ransomware gang. The attack affected nearly 2.5 million people.
CU InfoSecurity
Unknown date
Hidden
- Hidden commands in 'summarize with AI' buttons can bias future responses by embedding lasting preferences.
- This tactic, known as AI recommendation poisoning, exploits persistent memory features of AI assistants.
CU InfoSecurity
Unknown date
Hidden
• Researchers classify prompt injection attacks as a new category of 'promptware' distinct from traditional web server attacks. • The large language model industry has generally treated these attacks similarly to traditional web server...
CU InfoSecurity
Unknown date
Hidden
The article discusses the transition from raw telemetry data to actionable insights through AI-native Security Operations Center (SOC) tools. It highlights the importance of transforming large volumes of data into decision-quality signals for better...
CU InfoSecurity
Unknown date
Hidden
AI prompt injection attacks have been identified as a new and dangerous threat. Researchers recommend treating these attacks as 'promptware' distinct from traditional web server attacks.
CU InfoSecurity
Unknown date
Security
Threat actors prefer low-complexity attacks over sophisticated ones; Credit union compliance officers should prioritize rapid response and well-trod techniques.
CU InfoSecurity
Unknown date
Security
The webinar discusses using AI and human expertise to outpace threat actors; highlights the importance of combining technology with human oversight for effective compliance and risk management.
CU InfoSecurity
Unknown date
Hidden
Cyber threats are continuous and sophisticated; organizations need to prepare, respond, and recover with confidence. The article provides actionable insights for cyber resilience.
CU InfoSecurity
Unknown date
Hidden
The article highlights the need for banks to implement revocable AI identities and continuous trust models due to the growing use of agentic AI in financial transactions. Traditional authentication methods are inadequate as they...
CU InfoSecurity
Unknown date
Hidden
GitGuardian raises $50M for expanding secrets remediation and agent governance; focuses on AI agent defense.
CU InfoSecurity
Unknown date
Hidden
The Innovation Sandbox at RSAC will celebrate its 21st year by featuring AI-based solutions; past winners include EDR and XDR giant SentinelOne and cloud security phenom Wiz.
CU InfoSecurity
Unknown date
- GRC theater creates false confidence and should be replaced with continuous GRC engineering.
- Adversaries operate continuously, so GRC processes must also operate continuously.
CU InfoSecurity
Unknown date
Security
Kettering Health notified patients and affiliates of a potential data breach in May 2025; cybercriminal group Interlock claimed responsibility. The incident involved personal, health, and financial information.
CU InfoSecurity
Unknown date
Hidden
• Malware campaign uses positive portrayal of anti-Tehran protests as lures for cyberespionage.
• The operation targets dissident researchers and global communities.
CU InfoSecurity
Unknown date
Hidden
AI chatbots rank as the number-one health tech hazard in 2026; 'digital darkness' and legacy medical device cyber issues follow. Experts from ECRI Institute explain these risks.
CU InfoSecurity
Unknown date
Hidden
European probes into potential privacy breaches by Grok AI chatbot on X social media network; X claims to have stopped the chatbot from outputting offending images, but they are still generated.
CU InfoSecurity
Unknown date
Hidden
The webinar discusses the challenges of relying on point-in-time trust in financial reporting and highlights the need for more robust risk management practices. It emphasizes the importance of continuous monitoring over periodic assessments.
CU InfoSecurity
Unknown date
Hidden
Data minimization enhances resilience by reducing the impact of breaches and improving SOC efficiency; it is not a constraint but an enabler for security and innovation.