Latest from todaynewsMicrosoft files lawsuit against LLMjacking gang that bypassed AI safeguardsThe civil suit against four members of Storm-2139 underscores an emerging trend that blends stolen LLM credentials and AI jailbreaking to reap financial gains for cybercriminals and losses for companies they exploit.By Lucian Constantin28 Feb 20254 minsCybercrimeGenerative AIThreat and Vulnerability Management feature 5 things to know about ransomware threats in 2025By Rosalyn Page27 Feb 20259 minsData and Information SecurityGenerative AIRansomwarenews AI can kill banks: Cybersecurity’s disinformation gapBy Florian Maier24 Feb 20252 minsFinancial Services IndustryGenerative AISecurity newsHacker allegedly puts massive OmniGPT breach data for sale on the dark webBy Shweta Sharma 12 Feb 20253 minsData BreachGenerative AI news analysisNearly 10% of employee gen AI prompts include sensitive dataBy Evan Schuman 10 Feb 20256 minsData and Information SecurityGenerative AI newsHackers impersonate DeepSeek to distribute malwareBy Shweta Sharma 04 Feb 20253 minsGenerative AIMalwareSecurity featureDownload the Agentic AI Enterprise SpotlightBy CSO, InfoWorld, and CIO.com staff 02 Feb 20251 minGenerative AIIT StrategyRisk Management newsDeepSeek leaks one million sensitive records in a major data breachBy Gyana Swain 30 Jan 20255 minsData BreachGenerative AI newsThreat actors using Google Gemini to amplify attacks: ReportBy Howard Solomon 29 Jan 20257 minsCyberattacksGenerative AI ArticlesnewsDeepSeek hit by cyberattack and outage amid breakthrough successSome remain unconvinced that a cyberattack is to blame, noting that DeepSeek’s claims of low cost and efficiency remain unverified.By Prasanth Aby Thomas 28 Jan 2025 4 minsCyberattacksGenerative AISecuritynewsA pickle in Meta’s LLM code could allow RCE attacksAI frameworks, including Meta’s Llama, are prone to automatic Python deserialization by pickle that could lead to remote code execution.By Shweta Sharma 27 Jan 2025 3 minsGenerative AISecurityVulnerabilitiesnewsSecure AI? Dream on, says AI red teamMicrosoft’s ethical AI hackers provide some answers — as well as more questions.By Paul Barker 17 Jan 2025 1 minGenerative AISecuritynewsGenAI strategies put CISOs in a stressful bindExecutives are aggressively pressing for all manner of genAI deployments and experimentation despite knowing the risks — and CISOs are left holding the risk management bag.By Evan Schuman 14 Jan 2025 5 minsCSO and CISOGenerative AIRisk ManagementnewsThe deepfake threat just got a little more personalResearchers at Google DeepMind and Stanford University have created highly effective AI replicas of more than 1,000 people based on simple interviews.By Manfred Bremmer and CSO Staff 07 Jan 2025 3 minsGenerative AIfeatureGen AI is transforming the cyber threat landscape by democratizing vulnerability huntingLarge language models (LLMs) are proving to be valuable tools for discovering zero-days, bypassing detection, and writing exploit code — thereby lowering the barrier to entry for pen-testers and attackers alike.By Lucian Constantin 07 Jan 2025 15 minsGenerative AIPenetration TestingThreat and Vulnerability Managementfeature7 biggest cybersecurity stories of 2024CrowdStrike, Change Healthcare, rising ransomware threats and cyber regulations — here’s what dominated the headlines this year and how CISOs and cyber pros are adapting.By John Leyden 24 Dec 2024 10 minsData BreachRansomwareRegulationnewsThis new cipher tech could break you out of your genAI woesAs companies scramble for tougher shields against genAI risks, homomorphic encryption steps into the spotlight, bringing a unique superpower: it can crunch encrypted data without ever cracking it open. By Shweta Sharma 17 Dec 2024 7 minsEncryptionGenerative AISecurityfeatureGenAI use cases rising rapidly for cybersecurity — but concerns remainGenerative AI is showing growing utility for augmenting security ops, but studies suggest caution is still warranted, as cyber pros raise concerns about rapid adoption.By John Leyden 09 Dec 2024 8 minsGenerative AISecurity Operations CenterSecurity Practicesnews analysis10 most critical LLM vulnerabilitiesPrompt injection and supply chain vulnerabilities remain the main LLM vulnerabilities but as the technology evolves new risks come to light including system prompt leakage and misinformation.By Maria Korolov and Michael Hill 03 Dec 2024 18 minsGenerative AIVulnerabilitiesnewsAt Ignite, Microsoft looks to genAI, exposure managment, and new bug bounties to secure enterprise IT Microsoft is allocating $4 million to a new bug bounty program, Zero Day Quest, among other measures to enhance software security announced at its annual Ignite event.By Shweta Sharma 19 Nov 2024 4 minsGenerative AIIdentity and Access ManagementSecurityopinionImplementing zero trust in AI and LLM architectures: A practitioner's guide to secure and responsible AI systemsThis guide provides IT leaders with a comprehensive approach to applying zero-trust principles in AI and LLM architectures, emphasizing the integration of ethical considerations from the ground up.By Vaibhav Malik 14 Nov 2024 8 minsGenerative AIZero Trust Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation View all Explore a topic Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me moreLatestArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain