Meta AI Restricts Election-Related Responses in India to Combat Misinformation
However, there are also significant potential downsides to the use of AI in elections. Malicious actors could exploit AI to spread misinformation or disinformation about candidates or issues.
This could be done by creating fake social media accounts or websites that propagate false information about candidates.
AI could also be used to target voters with misleading or manipulative advertising, designed to exploit their fears or biases.
Cyber_Security_Channel
What is Data Protection as a Service (DPaaS)
DPaaS is available through many backup vendors, large public cloud providers, managed service providers and traditional infrastructure vendors that provide storage as a service (STaaS).
Cyber_Security_Channel
Top MITRE ATT&CK Techniques and How to Defend Against Them
For defenders looking to allocate limited attention and resources, here are just some of the most common ATT&CK techniques, and how to defend against them.
Cyber_Security_Channel
Scientists Install Encryption Shield to Protect Advanced Chinese Quantum Computer From Attack
The new methods are to replace the conventional public-key cryptography system, which could be vulnerable in the face of quantum computers with powerful computing capabilities.
The next year, the company delivered the 24-qubit Wuyuan second-generation machine – the country’s first practical quantum computer – making China the third country capable of delivering a complete quantum computing system after Canada and the United States.
Cyber_Security_Channel
LG Smart TVs at Risk of Attacks, Thanks to 4 OS Vulnerabilities
They impact webOS 4.9.7-5.30.40 running on LG43UM7000PLA, webOS 5.5.0-04.50.51 running on OLED55CXPUA, webOS 6.3.3-442 (kisscurl-kinglake)-03.36.50 running on OLED48C1PUB, and webOS 7.3.1-43 (mullet-mebin)-03.33.85 running on OLED55A23LA.
Cyber_Security_Channel
2024 Expectations From the SEC on AI, Cybersecurity and ESG
Organizations will likely remain hesitant to publicize at an early stage whether an incident has a significant impact on current or future revenues and it may take time for them to factor in reputation risk and loss of customer or investor trust into their determinations.
It is possible that the SEC will continue to interpret poorly considered or excessively risk-averse communications strategies as misrepresentations, meaning that organizations must have effective strategies in place ahead of an incident.
The SEC’s new climate disclosure rule has attracted legal and political challenges,8 given the current politicization of ESG.
These challenges will test how much climate information the SEC can require from companies under their existing legal authority.
Cyber_Security_Channel
Google Survey: 63% of IT and Security Pros Believe AI Will Improve Corporate Cybersecurity
The advent of AI in cybersecurity marks a transformative era in the realm of digital defense, bringing a blend of promising breakthroughs and intricate challenges," the researchers wrote in their survey.
"AI has the potential to be a vital ally in bolstering security defenses, identifying emerging threats, and facilitating swift responses.
Cyber_Security_Channel
GDPR, EU AI Act Will Overlap as Businesses Face Enforcement
DPAs function as independent public authorities that monitor and enforce the EU's data protection law, which governs data privacy and security and grants data rights to individuals.
While the GDPR focuses on data, DPAs can pursue investigations tied to technology such as artificial intelligence.
The newly adopted EU AI Act provides more comprehensive AI regulation, asking companies to categorize their AI systems into different risk levels and produce impact assessments.
The EU AI Act also asks member states to establish governing bodies to oversee the law's implementation.
Meanwhile, DPAs have already brought multiple AI-related enforcement actions against companies under the GDPR, and some DPA members are advocating that the DPAs should serve as EU AI Act enforcers as well, given how the GDPR and the EU AI Act could overlap in some ways.
Cyber_Security_Channel
SentinelOne® Revolutionizes Cybersecurity with Purple AI
SentinelOne is the leader in AI-powered security.
SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy and simplicity.
Leading enterprises including Fortune 10, Fortune 500, and Global 2000 companies, as well as prominent governments, trust SentinelOne to secure tomorrow.
Cyber_Security_Channel
Google Cloud, AI Event Kicks Off With Expanded Palo Alto Cybersecurity Pact
Amid the emergence of generative AI — which can generate text, images, sounds and video — tech companies are racing to build training models that use proprietary company data.
Google aims to license its Gemini large language model to enterprises and governments globally.
Microsoft's (MSFT) generative AI partnership with startup OpenAI has given its cloud computing business a boost.
Amazon Web Services, part of Amazon[com] (AMZN), is the biggest provider of cloud services.
Cyber_Security_Channel
The Real Battle for Data Privacy Begins When You Die
The people we love will die, but their data will continue to live indefinitely, digital ghosts in the cloud.
At the moment, there’s nothing stopping the Metas and Googles of the world from exploiting them—or perhaps worse, erasing them permanently.
Facebook turns death reported account as “memorialized account.”According to the company’s policy at the time, no one could access memorialized accounts, even with a password.
Facebook’s “memorialized” accounts, which turn the profile into a tribute page where friends can visit and post, are designed to be static.
In 2015 the company added a feature that allows a user to arrange for a “legacy contact” to manage the page after the account holder’s death.
But the contact can’t log in or read messages; they are able to curate tribute posts or request that accounts be removed.
Cyber_Security_Channel
Why Hub Cyber Security Shares Are Skyrocketing Today
Hub Cyber Security said in a press release that this strategic financing is part of the company’s ongoing effort to fortify its financial foundation and strategically invest in its future.
The company announced the successful acquisition for cash of Qpoint Technologies. “Acquiring QPoint is not just a transaction; it’s a strategic move deeply embedded in our long-term vision,” Hershcoviz (CEO) added.
There is a significant cross-selling opportunity between QPoint and Hub Cyber Security’s expanded offerings, with customers spanning the healthcare, government, energy, defense, and financial sectors.
Cyber_Security_Channel
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
The disclosure comes more than two months after the GrapheneOS team revealed that forensic companies are exploiting firmware vulnerabilities that impact Google Pixel and Samsung Galaxy phones to steal data and spy on users when the device is not at rest.
-----
📷 Image Credit: The Independent
Cyber_Security_Channel
Authy vs Google Authenticator: Two-Factor Authenticator Comparison
Twilio’s Authy is a mobile two-factor authentication app that strengthens online security by sending a one-time password to your mobile or desktop device.
It directly syncs with websites and services to grant user access and is completely free.
Cyber_Security_Channel
What to Know About Protecting Your Car Data Privacy
Some car companies do allow consumers to adjust connectivity settings, and drivers can read about how in their car's privacy policy.
But opting out of all data sharing isn't always possible.
-----
📌 Want to ensure your digital safety?
Become HACKPROOF:
→ Learn how to beat fraudsters, prevent identity theft, and say goodbye to cybercrime!
-----
Cyber_Security_Channel
Regulation Remains the Strongest Multiplier to Cybersecurity Growth
The rise of AI has also been increasing and has greatly affected the way cybersecurity could be enhanced at the same time allowing cyber criminals well-versed with AI to launch more sophisticated attacks against their victims and making themselves harder to detect and defend against.
The Internet of Things (IoT) vulnerabilities have also been increasing. According to Statista, the number of IoT devices exceeded 15 billion in 2023.
Cyber_Security_Channel
❤️ Thank You for 50,000 Subscribers on the Telegram News Channel!
↳ Special Competition...
-----
🫶 Dear community members,
We are super grateful for every one of you =)
At the end of the day, you make all of this possible and provide us with motivation!
-----
To celebrate, we are launching an exclusive contest!
🛠 How Does It Work?
1. You will receive a personal invite link to our News Channel.
2. Main goal: get as many people to join @Cyber_Security_Channel with your custom link.
3. Participant with the largest number of subscribers who followed our channel through their link will receive a prize.
🙋♂️ How To Participate?
1. Message @cybersecadmin:
→ “I want to participate in the Special Competition”
2. Pick up a custom invite link to our News Channel.
3. Start inviting new subscribers, get as many people as you can to enter the community through your link.
4. Be active for 30 days, compete for a Mystery Prize!
-----
⚡️Ready to Join the Fun?
→ Let us know: @cybersecadmin
Good luck!
GDPR in the Age of AI Raises a “Data Dilemma” for Enterprises
The process of data minimization is similarly restrictive to the AI supply chain, in that it demands that those collecting data only gather the minimum amount of data needed to deliver a service.“
Aligning with emerging regulations like DORA, which focuses on data security and resilience, is also crucial.
As AI evolves, fostering a synergy between innovation, data protection practices (like GDPR), and responsible regulations like DORA will be vital for its future,” he added.
Cyber_Security_Channel
Banking Giant Wells Fargo Suffers Data Breach, Sends Two Notification Letters
In the breach notification letter, the banking giant claims to be “taking measures to monitor (customer) account(s) for suspicious events or changes, and is continually reviewing security measures to reduce the likelihood of this happening in the future”.
Cyber_Security_Channel
Optiv Expands Strategic Alliance with Google Cloud to Deliver World-Class Cybersecurity Expertise
The Optiv and Google Cloud alliance brings clients:
• End-to-end SecOps transformation
• Scalable security operations solutions
• Third-party solutions through Google Cloud Marketplace
Sunil Potti, general manager and vice president of cloud security, Google Cloud, added, "Our partnership with Optiv combines the technology, people, and process necessary to make security as pervasive as possible and materially less complex.
Our globally recognized cybersecurity offerings including Chronicle Security Operations powered by our advanced AI services, coupled with Optiv's end-to-end expertise, from strategy to execution, enables clients to transform their businesses forward, safely
Cyber_Security_Channel
Misconfigured SaaS Applications Led to the Home Depot Data Breach, and Experts Say it’s no Surprise
Tim Bach, senior VP of security engineering at AppOmni, said while the rapid identification of the incident as the result of a SaaS misconfiguration was impressive, the fact this was the source of the breach was far from surprising.
Cyber_Security_Channel
Palo Alto Networks and Google Cloud Expand Partnership to Revolutionize Cybersecurity with AI
Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyber threats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally across all sectors.
Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation.
Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.
Cyber_Security_Channel
IHG Develops Travel Planner Powered by Google Cloud AI
Google Cloud became IHG’s cloud provider in 2022, when IHG migrated components of its data to BigQuery, a fully managed, serverless data warehouse.
IHG's selection of Google Cloud's AI technology for its upcoming Trip Planner feature was based on a variety of factors, including Google Cloud’s suite of AI technologies that IHG can grow with, and Google’s broad ecosystem of consumer products and services that will enable opportunities to create personalized experiences for travelers.
Google Cloud’s approach to cybersecurity, data governance and privacy also allows IHG to retain control over its data and enables data and applications to meet compliance and security standards, a key priority for IHG.
Cyber_Security_Channel
Elon Musk Faces Brazil Supreme Court Inquiry; US Lawmakers Strike Deal on Data Privacy; Retail Sales Soar in Singapore
Justice Moraes asserted that Musk had launched a disinformation campaign against the Supreme Court.
If X fails to comply with his order, the platform will be fined 100,000 reais per day, equivalent to £15,670.
The bill would not ban targeted advertising, but would give consumers the option to opt out of it.
The lawmakers leading the proposed change hope to advance the legislation soon.
Cyber_Security_Channel
Companies Line Up to Undercut Key Data Privacy Law
The law allows law enforcement officials such as judges, police officers and prosecutors to request companies stop sharing information such as their home address and phone number.
It also allows the officials to sue companies that don’t comply.
Data brokers have come under fire by privacy advocates and lawmakers in recent years, but the New Jersey law is one of the few laws passed to regulate them, and perhaps the toughest.
While some states now require data brokers to delete people’s information upon request, the lack of enforcement and the difficulty for consumers to opt out often allows data brokers to maintain the status quo.
Cyber_Security_Channel
Apple Could Get Its Wish for a Federal Privacy Law by the End of This Year
US companies can collect and store any personal data about you they like, provided they disclose this fact in their privacy policy – which can be worded in extremely general terms.
A key compromise on the Democrat side is that small businesses are exempt from the law, so long as they don’t sell customer data to third parties.
Cyber_Security_Channel
The 20 Hottest AI Cybersecurity Companies: The 2024 CRN AI 100
GenAI is making a particularly big splash for providers of security operations tools, where the ability to replace manual processes with natural language queries promises to offer a huge boost to productivity and effectiveness.
Cyber_Security_Channel
AI's Dual Role in SMB Brand Spoofing
However, AI is not just a tool in the attacker arsenal. Security architects are fighting back by designing security tools that use AI to detect and block impersonation attacks.
This gives organizations, especially SMBs with limited budgets and resources, a boost in their abilities to fight back.
Cyber_Security_Channel
Bethel School District Data Breach Causes Stress, Financial Issues for Community
“The computer system was down at Bethel and the phone systems were down at Bethel and I’m thinking that’s what it was at that time but they didn’t tell anybody that this was going on,” said the parent who talked with KOMO.
Cyber_Security_Channel
YouTube Video Game ‘Hacks’ Contain Malware Links
Many of the games used as lures were deliberately chosen because they are popular among children, Proofpoint said, indicating that the threat actors are trying to trick those less likely to follow online safety best practices.
Cyber_Security_Channel