US lawmakers have introduced a bill called the Taiwan Cybersecurity Resiliency Act aimed at strengthening Taiwan’s cyber defenses amid rising tensions in the Indo-Pacific region. China, who has become a cyber power, is accused of launching millions of cyberattacks each month against Taiwan, with some later used against the US. The bill requires the Department […]
Blog Grid
JupiterOne’s State of Cyber Assets Report reveals a significant 133% YoY growth in cyber assets for security organizations, leading to increased security complexity and pressure for cloud enterprises. The report indicates a surge in security vulnerabilities by 589%, which may be attributed to new technologies for vulnerability identification. The report stresses the importance of unified […]
The advancement of AI is expected to provide new tools for spammers to get past filters and persuade people to click on spam messages or provide personal information. Advances in generative language models like ChatGPT could be used to create personalized spam that targets an individual’s preferences, beliefs and personality traits, based on their social […]
The UK’s antitrust regulator has blocked Microsoft’s $69 billion acquisition of gaming giant Activision Blizzard over concerns that it would hinder competition in cloud gaming. The regulator said that Microsoft’s commitment to offer access to Activision’s “Call of Duty” franchise to leading cloud gaming platforms would not effectively remedy its concerns. Microsoft’s President Brad Smith […]
On Wednesday, the U.S. Commerce Secretary, Gina Raimondo, expressed concern that Chinese cloud computing companies, including Huawei Cloud and Alibaba Cloud, could potentially threaten U.S. national security. Raimondo pledged to examine a request made by nine Republican senators to add Huawei’s cloud unit, Alibaba Cloud, and other Chinese cloud service providers to the Entity List, […]
Cybersecurity experts from the SANS Institute have shared insights on the top five most dangerous new attack techniques being employed by cybercriminals and nation-state actors. The panelists presented these emerging Tactics, Techniques, and Procedures (TTPs) during a session at the RSA Conference in San Francisco, advising organizations on how to prepare for them. The SANS […]