article thumbnail

Broadcom Software's Symantec Threat Hunter Team discovers first-of-its-kind ransomware

Tech Republic Security

The new ransomware family, called Yanluowang, appears to still be under development and lacks some sophisticated features found in similar code. Nonetheless, Symantec said, it's dangerous.

Symantec 198
article thumbnail

1,859 Mobile Apps, Mostly iOS, Found Storing Hard-Coded Credentials for AWS Databases

IT Toolbox

Symantec research spotlights the gaping holes in secure upstream mobile application development and its potential consequences to data security and privacy. The post 1,859 Mobile Apps, Mostly iOS, Found Storing Hard-Coded Credentials for AWS Databases appeared first on Spiceworks.

Mobile 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Learn how agencies are turning to BYOD to ensure security and ROI. Steve Bennett , CEO, Symantec. Track D: Securing Your Infrastructure.

Symantec 261
article thumbnail

Generative AI and the Transformation of Everything

CIO Business Intelligence

The implications for enterprise security For most enterprises, the present moment is an educational process. That data leakage is the principal security concern regarding generative AI of enterprises today. It’s important to note here that generative AI today is a content development engine. At least, not yet.

Symantec 127
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO Business Intelligence

Generative AI has taken the world seemingly by storm, impacting everything from software development, to marketing, to conversations with my kids at the dinner table. Abuse by Attackers: There have also been concerns raised that attackers will leverage Generative AI tools such as ChatGPT to develop novel new attacks.

article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Enterprise AI traffic monitoring: Vigilantly monitor AI activities within the enterprise to identify anomalies or potential security threats and allow for prompt intervention. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities.

Company 67
article thumbnail

Microsoft disrupted Trickbot, a ‘prolific’ ransomware distributor and election security threat

GeekWire

. “We have now cut off key infrastructure so those operating Trickbot will no longer be able to initiate new infections or activate ransomware already dropped into computer systems,” Microsoft security exec Tom Burt wrote in the blog post. The Redmond, Wash.-based

Microsoft 130