• How to Investigate ChatGPT activity in Google Workspace

    How to Investigate ChatGPT activity in Google Workspace

    When you connect your organization’s Google Drive account to ChatGPT, you grant ChatGPT extensive permissions for not only your personal files, but resources across your entire shared drive. As you might imagine, this introduces an array of cybersecurity challenges. This post outlines how to see ChatGPT activity natively in the Google Workspace admin console, and…

    Read More

  • Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts

    Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts

    Meta has announced that it will begin training its artificial intelligence (AI) systems using public content shared by adult users across Facebook and Instagram in the U.K. in the coming months. “This means that our generative AI models will reflect British culture, history, and idiom, and that UK companies and institutions will be able to…

    Read More

  • News Brief: Cantwell joins Dems fundraiser

    News Brief: Cantwell joins Dems fundraiser

    STEVENSON — The annual Roosevelt Dinner fundraiser for the Skamania County Democrats is Sunday, Sept. 22 at the Hegewald Center, 710 Rock Creek Drive.

    Read More

  • Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users

    Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users

    Cryptocurrency exchange Binance is warning of an “ongoing” global threat that’s targeting cryptocurrency users with clipper malware with the goal of facilitating financial fraud. Clipper malware, also called ClipBankers, is a type of malware that Microsoft calls cryware, which comes with capabilities to monitor a victim’s clipboard activity and steal sensitive data a user copies,…

    Read More

  • Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution

    Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution

    A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote code execution on cloud servers by means of a supply chain attack technique called dependency confusion. The vulnerability has been codenamed CloudImposer by Tenable Research. “The vulnerability could have allowed an attacker to hijack an internal software…

    Read More

  • North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware

    North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware

    Cybersecurity researchers are continuing to warn about North Korean threat actors’ attempts to target prospective victims on LinkedIn to deliver malware called RustDoor. The latest advisory comes from Jamf Threat Labs, which said it spotted an attack attempt in which a user was contacted on the professional social network by claiming to be a recruiter…

    Read More

  • From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook

    From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook

    Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit? Not a rogue virus, but a compromised identity. The attacker is inside your walls, masquerading as a trusted user. This isn’t a horror movie, it’s the new reality of cybercrime. The question is, are you…

    Read More

  • Master Your PCI DSS v4 Compliance with Innovative Smart Approvals

    Master Your PCI DSS v4 Compliance with Innovative Smart Approvals

    The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet the stringent new requirements of PCI DSS v4.0. Two sections in particular, 6.4.3 and 11.6.1, are troublesome as they demand that organizations rigorously monitor and manage payment page scripts and use a robust change detection…

    Read More

  • Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure

    Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure

    Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical “threat intelligence” information. The development was first reported by The Washington Post on Friday. The iPhone maker said its efforts, coupled with those of others in the…

    Read More

  • Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability

    Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability

    Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which allows remote code execution under certain circumstances. “An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518…

    Read More