The CISA KEV Catalog is a crucial resource for organizations to understand and prioritize actively exploited vulnerabilities. This blog post delves into three key insights from an analysis of the KEV Catalog, offering valuable strategies to enhance vulnerability management practices.
Explore the Wide Range of Categories and Services and What It Takes to Do the Job Cybersecurity consulting encompasses a wide array of services and specialties, ranging from high-level strategic guidance to hands-on technical support. Discover the categories and learn how to position yourself as a trusted expert in the cybersecurity consulting field.
Crowded Leak Site May Be a Weakness and Fewer New Players a Sign of Higher Quality How many ransomware victims pay their attackers a ransom precisely to avoid having their names listed - or their stolen data dumped - on a ransomware group's data leak blog? We don't know, but leak site posts don't correlate well with security firms' telemetry data.
How to Responsibly Embrace AI's Potential to Strengthen Cybersecurity Defenses Verizon’s 2024 DBIR shows a gap between generative AI's perceived capabilities and its actual use in cyberattacks, citing skyrocketing gen AI "hype" and very low actual gen AI "mentions" alongside traditional attack types. But it's still essential for security leaders to focus on AI risks now.
Aging Technology and Rising Competition Have Created a Need for Greater Investment The owners of eSentire are exploring a potential sale that could value the company at about $1 billion and attract the interest of private equity firms. The company is hoping to command a valuation equivalent to more than seven times its annual recurring revenue of about $150 million.
Officials Say the Olympic Games Saw 140 Cyberattacks. None Were Successful. France’s cyber defense agency teamed up with governments and security experts from across the globe to identify and mitigate a historic level of both physical and cyber threats following years of preparation, experts tell Information Security Media Group.
1.3 Million Individuals Being Notified Their Social Security Numbers Were Stolen Background check firm Jericho Pictures, which does business as National Public Data, is notifying 1.3 million individuals that their personal information was stolen via a December 2023 breach of its systems. The stolen information was listed for sale on a cybercrime market beginning in April.
Cybercriminal Gang RansomHub Claims It Leaked 700 Gigabytes of Lab's Stolen Data Florida drug testing medical laboratory American Clinical Solutions told federal regulators that 300,000 individuals are caught up in a hacking incident now that criminal gang RansomHub has published 700 gigabytes worth of data stolen from the lab's network.
NYU's Brennan Lodge on Training Your Own Model With Retrieval Augmented Generation Many cybersecurity organizations hope generative artificial intelligence and large language models will help them secure the enterprise and comply with the latest regulations. But to date, commercial LLMs have big problems - hallucinations and a lack of timely data, said NYU professor Brennan Lodge.