FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

The Ultimate SaaS Security Posture Management Checklist, 2025 Edition

By: The Hacker News β€” May 22nd 2024 at 10:01
Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate SaaS sprawl has been growing at a double-digit pace. In large enterprises, the number of SaaS applications in use today is in the hundreds, spread across departmental stacks, complicating the job of security teams to protect organizations against
☐ β˜† βœ‡ The Hacker News

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

By: The Hacker News β€” March 21st 2024 at 11:30
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to the mix, the complexity and potential vulnerabilities within the SaaS supply chain snowball quickly. That’s why effective vendor risk management (VRM) is a
☐ β˜† βœ‡ The Hacker News

Over 100 Malicious AI/ML Models Found on Hugging Face Platform

By: Newsroom β€” March 4th 2024 at 09:22
As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered in the Hugging Face platform. These include instances where loading a pickle file leads to code execution, software supply chain security firm JFrog said. "The model's payload grants the attacker a shell on the compromised machine, enabling them to gain full control over victims'
☐ β˜† βœ‡ The Hacker News

Three Tips to Protect Your Secrets from AI Accidents

By: The Hacker News β€” February 26th 2024 at 10:29
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the "OWASP Top 10 For Large Language Models," reaching a 1.0 document in August and a 1.1 document in October. These documents not only demonstrate the rapidly evolving nature of Large Language Models, but the evolving ways in which they can be attacked and defended. We're going to talk in this
☐ β˜† βœ‡ The Hacker News

NIST Warns of Security and Privacy Risks from Rapid AI System Deployment

By: Newsroom β€” January 8th 2024 at 07:53
The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that arise as a result of increased deployment of artificial intelligence (AI) systems in recent years. β€œThese security and privacy challenges include the potential for adversarial manipulation of training data, adversarial exploitation of model vulnerabilities to
☐ β˜† βœ‡ The Hacker News

Non-Human Access is the Path of Least Resistance: A 2023 Recap

By: The Hacker News β€” December 12th 2023 at 11:25
2023 has seen its fair share of cyber attacks, however there’s one attack vector that proves to be more prominent than others - non-human access. With 11 high-profile attacks in 13 months and an ever-growing ungoverned attack surface, non-human identities are the new perimeter, and 2023 is only the beginning.  Why non-human access is a cybercriminal’s paradise  People always
☐ β˜† βœ‡ The Hacker News

AI Solutions Are the New Shadow IT

By: The Hacker News β€” November 22nd 2023 at 11:08
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike theΒ SaaS shadow ITΒ of the past, AI is placing CISOs and cybersecurity teams in a tough but familiar spot.Β  Employees are covertly using AIΒ with little regard for established IT and cybersecurity review procedures. ConsideringΒ ChatGPT’s meteoric rise to 100 million users within 60 days of launch, especially with little
❌