Over the last year there has been a prevailing sentiment that while AI will not necessarily be replacing humans, humans who use AI will replace those that don’t. This sentiment also applies to the next era of cybersecurity, which has been rapidly unfolding over the last year. Recent breakthroughs in generative AI hold enormous promise for modern defenders. Amid the dual … [Read more...] about Charlotte AI’s Multi-AI Approach | CrowdStrike
News
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a … [Read more...] about Apache Cordova App Harness Targeted in Dependency Confusion Attack
Protecting Employees’ Sensitive Data on the Web
Organizations are increasingly concerned about high-profile employees’ information being exposed on the deep and dark web. The CrowdStrike Counter Adversary Operations team is often asked to find fake social media accounts and personally identifiable information (PII) that might be exposed. Impersonations and leaked PII can unravel lives and ruin the reputations of individuals … [Read more...] about Protecting Employees’ Sensitive Data on the Web
Nature Communications Publishes Zapata AI Research on Generative AI for Optimization
The paper demonstrates how generative AI can improve upon existing techniques for solving optimization problems common in industrial settings. Zapata Computing Holdings Inc. (Nasdaq: ZPTA), the Industrial Generative AI company, announced that its foundational research on generator-enhanced optimization (GEO) has been published in the esteemed Nature … [Read more...] about Nature Communications Publishes Zapata AI Research on Generative AI for Optimization
Porter Airlines Cybersecurity Consolidation | CrowdStrike
As Porter Airlines scaled its business, it needed a unified cybersecurity platform to eliminate the challenges of juggling multiple cloud, identity and endpoint security products. Porter consolidated its cybersecurity strategy with the single-agent, single-console architecture of the AI-native CrowdStrike Falcon® XDR platform. With the Falcon platform, the airline has reduced … [Read more...] about Porter Airlines Cybersecurity Consolidation | CrowdStrike
Exploring 11 popular machine learning algorithms
Over the past few years, machine learning (ML) has quietly become an integral part of our daily lives. It impacts everything from personalized recommendations on shopping and streaming sites to protecting our inboxes from the onslaught of spam we get every day. But it’s not purely a tool for our convenience. Machine learning has become crucial in the current tech landscape, and … [Read more...] about Exploring 11 popular machine learning algorithms
5 Best Practices to Secure AWS Resources
Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps businesses drive growth and innovation. However, as organizations migrate to the cloud, they face a complex and growing threat … [Read more...] about 5 Best Practices to Secure AWS Resources
The Solution to Data in Motion Is to Just Stop
Data lakehouse architectures promise the combined strengths of data lakes and data warehouses, but one question arises: why do we still find the need to transfer data from these lakehouses to proprietary data warehouses? In this article, we’ll explore how to maximize the efficiency of lakehouses, eliminate data in motion, and streamline data management processes. The Status … [Read more...] about The Solution to Data in Motion Is to Just Stop
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on various programs to harvest data on an "industrial scale" from primarily governmental … [Read more...] about Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with the malware. RedLine … [Read more...] about New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth