Threats & Breaches
Caesars Bungling Notice of Data Breach
Caesars Rewards Members are receiving notice of the data breach that occurred more than a month prior. The breach occurred in August 2023, but Caesars did not report it to regulatory officials ...
The President’s EO on AI – What it Does and Why it Won’t Work
President Biden's EO lacks the effect of law, does not mandate much of anything and overlooks some of the trickiest AI issues ...
CISA Seeks Public Input for Supply Chain Security ImprovementsÂ
CISA recently took a significant step in bolstering software supply chain security by issuing a formal request for public input ...
Weekly Blog Wrap-Up (October 30 – November 2, 2023)
Welcome to the TuxCare Weekly Blog Wrap-Up – your go-to resource for the latest insights on cybersecurity strategy, Linux security, and how to simplify the way your organization protects its data and ...
A10 Expands AI-Driven Security Strategy to Battle DDoS Attacks
A10 Networks is building out a security strategy that leverages AI and machine-learning techniques to help enterprises protect themselves against the growing threat of increasingly sophisticated distributed denial-of-service (DDoS) attacks. The company ...
AI Safety: 28 Nations+EU Agree to Test in Turing’s Huts
Foo, bar, Bletchley—declaration signed at UK’s AI Safety Summit: Not much substance, but unity is impressive ...
SlashNext: ChatGPT Led to a 1,265% Jump in Phishing Attacks
In the first months after OpenAI in November 2022 released its ChatGPT chatbot, security researchers warned that the wildly popular generative AI technology could be used by cybercriminals for their nefarious efforts, ...
The Cloud has a serious and fragile vulnerability: Access Tokens
The Transport Layer Security (TLS) protocol is the most important security protocol in the majority of organizations guaranteeing secure communications. However, it is often managed solely to prevent outages, instead of a ...
Every Rose Has Its Thorn SFTP Gateway
Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. The recent ...
Cybersecurity Demands a Singular Understanding of Cyber Risk
Lost in Translation: The Disjointed Realities of Cyber Risk Interpretation In a classic tale from ancient India, a few blindfolded individuals approach an elephant, each examining a different part. One touches the ...