OPSWAT enhances its MetaDefender Kiosk product line

OPSWAT announced new advancements to its MetaDefender Kiosk product line. In response to the escalating challenges faced by organizations in managing and handling threats originating from peripheral media such... Read more »

Metomic for ChatGPT identifies critical risks in ChatGPT conversations

Metomic launched Metomic for ChatGPT, a technology that gives IT and security leaders full visibility into what sensitive data is being uploaded to OpenAI’s ChatGPT platform. The easy-to-use browser... Read more »

AnyDesk has been hacked, users urged to change passwords

AnyDesk Software GmbH, the German company behind the widely used (and misused) remote desktop application of the same name, has confirmed they’ve been hacked and their production systems have... Read more »

Latio Application Security Tester: Use AI to scan your code

Latio Application Security Tester is an open-source tool that enables the usage of OpenAI to scan code from the CLI for security and health issues. Features and future plans... Read more »

Researchers discover exposed API secrets, impacting major tech tokens

Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets were highly critical, i.e. could lead to financial risks... Read more »

Businesses banning or limiting use of GenAI over privacy risks

Privacy is much more than a regulatory compliance matter. Findings from a new Cisco study highlight the growing Privacy concerns with GenAI, trust challenges facing organizations over their use... Read more »

How cybersecurity strategies adapt to evolving threats

Cybersecurity strategies are essential components of modern organizations, designed to protect digital assets, sensitive information, and overall business continuity from potential cyber threats. As technology advances, the complexity and... Read more »

Migrating to the cloud: An overview of process and strategy

Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected to grow exponentially. According to Gartner, more than 70%... Read more »

Week in review: Windows Event Log zero-day, exploited critical Jenkins RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Prioritizing cybercrime intelligence for effective decision-making in cybersecurity In this Help Net Security interview,... Read more »

Verimatrix partners with AWS to increase reliability for OTT content security

Verimatrix collaboration with AWS to further bolster scalability, availability and ease of use for its Streamkeeper Multi-DRM cloud-based OTT content security platform. Streamkeeper Multi-DRM, a multi-tenant platform deployed on... Read more »
Subscribe to our Newsletter