Posts in Security

Star Health Faces $68K Ransom Demand After Major Data Breach Exposes Customer Information

India’s Star Health and Allied Insurance recently disclosed that it was targeted by a ransomware attack, resulting in a significant data breach. Following the attack,[…]

a scrabble board with the letters a and a

Quantum Computing: The Next Frontier for Cybersecurity Threats

With the rapid evolution of quantum computing, a new threat looms over the cybersecurity landscape. The concept of “harvest now, decrypt later” is becoming a[…]

Safeguarding AI: Addressing the Surge in Adversarial Attacks

Artificial Intelligence (AI) is revolutionizing various industries, but it’s also becoming a prime target for adversarial attacks. These attacks, where malicious actors manipulate AI models[…]

HID Signo Readers Line to further meet physical access control needs

HID announces the expansion of its signature line of Signo Readers to include models that meet varying customer needs – from harsh conditions and stylistic[…]

person in white shirt using computer

Tenable Introduces AI Aware: A Proactive Security Solution for AI and LLMs

Tenable announced the release of AI Aware, an advanced detection capability designed to rapidly surface artificial intelligence solutions, and the vulnerabilities and weaknesses available in[…]

Elastic expedites SecOps tasks with LangChain

Elastic in collaboration with LangChain, the de facto generative AI orchestration library, is building and delivering AI capabilities that expedite labor-intensive SecOps tasks. The collaboration[…]

Tenable Enhances Nessus Risk Prioritization

Tenable announced new risk prioritization and compliance features for Tenable Nessus, a vulnerability assessment solution. Nessus supports new and updated vulnerability scoring systems – Exploit Prediction[…]

Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk: Study

Tenable has released a research report titled “The Critical Few: How to Expose and Close the Threats that Matter” that identifies the key exposure points[…]

crop hacker silhouette typing on computer keyboard while hacking system

Rise of Digital Arrests: How Hackers Are Stealing Money from Indians

In recent years, India has witnessed a surge in digital financial transactions, driven by widespread internet access and the proliferation of smartphones. However, this digital[…]

numbers projected on face

AI-Powered Patch Management: A New Era in Cybersecurity

In the evolving landscape of cybersecurity, patch management has emerged as a critical defense against vulnerabilities that could lead to data breaches. Traditionally, patch management[…]