How to Investigate ChatGPT activity in Google Workspace

Sep 17, 2024The Hacker NewsGenAI Security / SaaS Security When you connect your organization’s Google Drive account to ChatGPT, you grant ChatGPT extensive permissions for not only your personal files, but resources across your entire shared drive. As you might imagine, this introduces an array of cybersecurity challenges. This post outlines how to see ChatGPT […]
How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits

Sep 09, 2024The Hacker NewsData Security / GenAI Security GenAI has become a table stakes tool for employees, due to the productivity gains and innovative capabilities it offers. Developers use it to write code, finance teams use it to analyze reports, and sales teams create customer emails and assets. Yet, these capabilities are exactly the […]
Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

Sep 02, 2024The Hacker NewsCybercrime / CISO Insights The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new […]
How to Turn Developers into Security Champions

Jul 18, 2024The Hacker NewsApp Security / Security Awareness Let’s face it: AppSec and developers often feel like they’re on opposing teams. You’re battling endless vulnerabilities while they just want to ship code. Sound familiar? It’s a common challenge, but there is a solution. Ever wish they proactively cared about security? The answer lies in […]
Here’s how to find out if your data was stolen in AT&T’s massive hack

If you’re one of AT&T’s cellular customers, you can check your account to see if your data was compromised as part of the massive breach the telecom giant announced on Friday. If you were an AT&T customer between May 1, 2022 to Oct. 31, 2022, it’s likely your data was involved, given that the company […]
How to Stay Ahead of Threat Actors

The modern kill chain is eluding enterprises because they aren’t protecting the infrastructure of modern business: SaaS. SaaS continues to dominate software adoption, and it accounts for the greatest share of public cloud spending. But enterprises and SMBs alike haven’t revised their security programs or adopted security tooling built for SaaS. Security teams keep jamming […]
How to Use Python to Build Secure Blockchain Applications

Did you know it’s now possible to build blockchain applications, known also as decentralized applications (or “dApps” for short) in native Python? Blockchain development has traditionally required learning specialized languages, creating a barrier for many developers… until now. AlgoKit, an all-in-one development toolkit for Algorand, enables developers to build blockchain applications in pure Python. This […]
How to Cut Costs with a Browser Security Platform

Jun 25, 2024The Hacker NewsBrowser Security / Endpoint Security Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk – the browser. Network and endpoint solutions are limited in their ability to protect from web-borne threats like phishing websites or malicious browser extensions. They also do not […]
How to Build Your Autonomous SOC Strategy

Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a security operations center (SOC). The hype about generative AI is still everywhere, but security teams have to live in reality. They face constantly incoming alerts from endpoint security platforms, SIEM tools, and phishing emails reported […]
Ticketmaster is the latest company to be hacked. Here’s how to check if you’ve been affected by a data breach

More than half a million Ticketmaster users woke to the news they may have had their personal information compromised. It’s the latest cyber attack to hit a major company. And for many of us, we may be wondering what we need to do to protect ourselves from hackers and scammers. So, we spoke to cybersecurity […]