CU InfoSecurity
Unknown date
Hidden
The article discusses the importance of minimizing the attack surface in IT-OT converged manufacturing environments. It emphasizes the need for robust cybersecurity measures and regular risk assessments.
CU InfoSecurity
Unknown date
Hidden
• Ransomware hackers stole research files from the University of Hawaii Cancer Center in an incident in August 2025.
• The hack highlights risks involving compromises of medical research data.
CU InfoSecurity
Unknown date
Hidden
Modernization through AI and cloud platforms has led to an increased attack surface due to identity sprawl; experts recommend addressing this issue to secure enterprise environments.
CU InfoSecurity
Unknown date
Security
Researchers detail an active Magecart campaign targeting WooCommerce and Stripe payment forms. ConnectPOS exposes its code repository for years, posing a supply-chain risk for customers.
CU InfoSecurity
Unknown date
Hidden
CISOs must consider UX decisions as security and governance risks due to the convergence of privacy laws. Manipulative UX, consent flows, and retention practices can indicate a breach of fiduciary duty.
CU InfoSecurity
Unknown date
Security
• A flaw in Broadcom chipsets used in wireless routers allows attackers to disrupt the 5 GHz band regardless of security settings. • Credit unions should be aware of this cybersecurity risk.
CU InfoSecurity
Unknown date
Hidden
The article highlights the increasing risk from third-party breaches in AI environments and notes that traditional vendor risk management processes may not be sufficient. It suggests that CIOs will need to adapt their strategies...
CU InfoSecurity
Unknown date
Hidden
Modern enterprises struggle with identity management as identities are created and discarded without proper oversight; this creates a larger attack surface for adversaries. The article highlights the need for better visibility and control over...
CU InfoSecurity
Unknown date
Hidden
• SecurityBridge's new CEO Jesper Zerlang emphasizes SAP security as a weak link in enterprise risk strategies.
• He plans global expansion and leveraging product differentiators, including focusing on SAP security.
CU InfoSecurity
Unknown date
Hidden
NIST is seeking public input on security threats from agentic AI; stakeholders may help identify vulnerabilities and mitigate risks in federal networks.
CU InfoSecurity
Unknown date
Hidden
1Password has appointed Nancy Wang, a former AWS executive, as chief technology officer to oversee the development of agentic AI security strategies. Agents are described as their own class of identities.
CU InfoSecurity
Unknown date
Hidden
TX
• California fined and banned a Texas data broker for selling sensitive health and demographic data. • The firm's activities, including targeting older adults with health condition lists, were part of a broader privacy...
CU InfoSecurity
Unknown date
Security
• Combining employee training with behavioral monitoring and AI guardrails is essential for mitigating identity risk in the face of AI-driven phishing threats. • The shift from brute-force attacks to AI-powered phishing poses tougher...
CU InfoSecurity
Unknown date
Hidden
Threat actors launched coordinated campaigns targeting over 91,000 AI infrastructure attacks between October and January. The attacks probed more than 70 model endpoints from major providers like OpenAI, Anthropic, and Google to build future...
CU InfoSecurity
Unknown date
Hidden
• UK communications regulator Ofcom is formally investigating social media network X over its AI Grok AI's ability to virtually undress users, including minors. • The investigation stems from concerns about compliance with the...
CU InfoSecurity
Unknown date
Guidance
The webinar discusses the benefits of using a unified platform for improving visibility and response in compliance operations. Attendees learn about integrating various systems to enhance data management and streamline regulatory reporting.
CU InfoSecurity
Unknown date
Hidden
• Instagram confirmed a massive wave of password reset emails was due to malicious abuse of a legitimate feature but denied any breach of its systems. • Security experts reported the leak of 6.2...
CU InfoSecurity
Unknown date
Hidden
CrowdStrike acquires SGNL for $740M to enhance dynamic access control; expands identity capabilities for both human and nonhuman identities.
CU InfoSecurity
Unknown date
Hidden
• Security teams can use common tools and practices to protect both IT and OT environments.
• Hitachi Energy designated a single leader for IT-OT environments years ago.
CU InfoSecurity
Unknown date
Security
• The article highlights the ongoing issue of lack of Multi-Factor Authentication (MFA) contributing to cloud data breaches. • It also touches on how researchers are exploring new methods for data protection in an...
CU InfoSecurity
Unknown date
Security
• Over 700,000 Illinois residents notified of a data breach due to incorrect privacy settings on a mapping platform.
• The breach exposed sensitive information related to Medicare, Medicaid, and rehabilitation services recipients.
CU InfoSecurity
Unknown date
Hidden
• Suspected Chinese cyber campaign linked to Salt Typhoon breached congressional staff email systems.
• Sensitive discussions related to China, intelligence, and military oversight were exposed.
CU InfoSecurity
Unknown date
Hidden
AI failures can be subtle and potentially dangerous; safety tests may not catch all errors.
Healthcare chatbots pose risks, especially for users with specific medical conditions.
CU InfoSecurity
Unknown date
Hidden
Cisco has patched a critical Identity Services Engine bug; HPE OneView is being actively exploited with warnings from cybersecurity officials; proof-of-concept exploits have been released for n8n automation software.
CU InfoSecurity
Unknown date
Security
Moody's predicts firewalls will become obsolete; Sedgwick confirms a data breach; Romanian power firm and D-Link devices were targeted by cyber attacks.