#security-risks

[ follow ]
#devsecops
fromHackernoon
1 year ago
Information security

From Repos to Risks: How Hardcoded Secrets in GitHub Source Code Create Security Risks | HackerNoon

Hardcoded secrets in source code expose organizations to significant security risks, necessitating greater awareness and secure practices in development environments.
fromDevOps.com
12 hours ago
Artificial intelligence

AI-Powered DevSecOps: Navigating Automation, Risk and Compliance in a Zero-Trust World - DevOps.com

AI automation in DevSecOps enhances efficiency but introduces risks if not managed wisely.
fromITPro
6 months ago
Artificial intelligence

DevSecOps teams are ramping up the use of AI coding tools, but they've got serious concerns - AI-generated code is causing major security headaches and slowing down development processes

AI is widely used in coding, but security concerns about generated code are significant among developers.
Investing in AI requires careful governance strategies to protect sensitive data.
Most organizations recognize challenges of AI but lack confidence in their security measures.
Information security
fromHackernoon
1 year ago

From Repos to Risks: How Hardcoded Secrets in GitHub Source Code Create Security Risks | HackerNoon

Hardcoded secrets in source code expose organizations to significant security risks, necessitating greater awareness and secure practices in development environments.
fromITPro
6 months ago
Artificial intelligence

DevSecOps teams are ramping up the use of AI coding tools, but they've got serious concerns - AI-generated code is causing major security headaches and slowing down development processes

AI is widely used in coding, but security concerns about generated code are significant among developers.
Investing in AI requires careful governance strategies to protect sensitive data.
Most organizations recognize challenges of AI but lack confidence in their security measures.
more#devsecops
#vulnerabilities
Information security
fromTechzine Global
1 month ago

AI is making the software supply chain more perilous than ever

The JFrog report highlights security risks in the software supply chain, detailing threats from vulnerabilities, malicious packages, exposed secrets, and human error.
fromInsideHook
3 months ago
Information security

Subaru Tracking Hack Raises Larger Privacy Questions

Sam Curry identified a serious security vulnerability in Subaru's Starlink system impacting vehicle safety and driver privacy.
fromHackernoon
2 years ago
JavaScript

Code Smell 262 - Not Replaced Constants | HackerNoon

Ignoring constant replacement leads to severe security risks.
Information security
fromTechzine Global
1 month ago

AI is making the software supply chain more perilous than ever

The JFrog report highlights security risks in the software supply chain, detailing threats from vulnerabilities, malicious packages, exposed secrets, and human error.
fromInsideHook
3 months ago
Information security

Subaru Tracking Hack Raises Larger Privacy Questions

Sam Curry identified a serious security vulnerability in Subaru's Starlink system impacting vehicle safety and driver privacy.
fromHackernoon
2 years ago
JavaScript

Code Smell 262 - Not Replaced Constants | HackerNoon

Ignoring constant replacement leads to severe security risks.
more#vulnerabilities
#cybersecurity
Information security
fromITPro
6 months ago

96% of SMBs are missing critical cybersecurity skills - here's why

The majority of SMBs face gaps in cybersecurity skills, with significant difficulties in investigating security alerts.
fromITPro
1 month ago
Information security

What are business logic vulnerabilities?

Business logic vulnerabilities are unique, often overlooked risks posing serious threats to businesses, exploiting how systems process data rather than technical weaknesses.
fromSecuritymagazine
5 months ago
Information security

Panelists will discuss third-party risks at SECURITY 500 Conference

Third-party vendors present increasing security risks that need effective management strategies.
fromSecuritymagazine
9 months ago
Information security

The bad actor's best friend: Dormant service accounts

Dormant accounts pose significant security risks due to inactivity, making them prone to attacks.
fromTheregister
4 months ago
Information security

Researchers find 336k Prometheus instances open to web

Prometheus monitoring toolkit exposes vast numbers of servers to security risks, requiring urgent attention to mitigate vulnerabilities.
Information security
fromITPro
6 months ago

96% of SMBs are missing critical cybersecurity skills - here's why

The majority of SMBs face gaps in cybersecurity skills, with significant difficulties in investigating security alerts.
fromITPro
1 month ago
Information security

What are business logic vulnerabilities?

Business logic vulnerabilities are unique, often overlooked risks posing serious threats to businesses, exploiting how systems process data rather than technical weaknesses.
fromSecuritymagazine
5 months ago
Information security

Panelists will discuss third-party risks at SECURITY 500 Conference

Third-party vendors present increasing security risks that need effective management strategies.
fromSecuritymagazine
9 months ago
Information security

The bad actor's best friend: Dormant service accounts

Dormant accounts pose significant security risks due to inactivity, making them prone to attacks.
fromTheregister
4 months ago
Information security

Researchers find 336k Prometheus instances open to web

Prometheus monitoring toolkit exposes vast numbers of servers to security risks, requiring urgent attention to mitigate vulnerabilities.
more#cybersecurity
fromBusiness Insider
1 month ago
DC food

Denmark's defense committee head said he regrets choosing the F-35: 'We must avoid American weapons if at all possible'

Buying American weapons poses a security risk for Denmark, according to defense committee head Rasmus Jarlov.
#technology-development
fromSecuritymagazine
2 months ago
Artificial intelligence

US declines international AI declaration, security leaders discuss

The U.S. and U.K. decline to sign the AI Action Summit agreement highlights concerns about the fragmented global regulatory landscape for AI development.
fromTNW | Deep-Tech
6 months ago
Artificial intelligence

Can OpenAI's Strawberry program deceive humans?

OpenAI's new AI, Strawberry, claims reasoning capabilities but raises ethical concerns regarding manipulation and potential misuse.
fromTNW | Deep-Tech
6 months ago
Artificial intelligence

Can OpenAI's Strawberry program deceive humans?

OpenAI's new AI, Strawberry, claims reasoning capabilities but raises ethical concerns regarding manipulation and potential misuse.
more#technology-development
fromSecuritymagazine
3 months ago
Data science

Take a security team from data-wrangling to data analysis

Data analysts spend 80% of their time on data cleaning rather than actual analysis, undermining organizational security efforts.
fromArs Technica
3 months ago
European startups

Startup necromancy: Dead Google Apps domains can be compromised by new owners

Startups often fail to properly close Google accounts before domain expiration, creating security vulnerabilities.
Buying abandoned startup domains can lead to accessing sensitive information from former employee accounts.
fromTechzine Global
3 months ago
Miscellaneous

Netherlands further tightens export restrictions on chip equipment

The Netherlands is tightening export controls on specific chip production equipment due to security risks, affecting a limited number of companies.
fromFuturism
3 months ago
Artificial intelligence

There's a Fascinating Reason OpenAI Is Afraid to Launch Its AI-Powered "Agents"

OpenAI is delaying its AI agent release due to security concerns over prompt injection attacks.
#saas
fromMedium
5 months ago
Information security

Is It Time to Limit SaaS and Return to On-Prem?

SaaS solutions provide modern convenience but pose significant security and compliance risks that businesses must navigate carefully.
fromMedium
5 months ago
Information security

Is It Time to Limit SaaS and Return to On-Prem?

SaaS solutions provide scalability and cost-efficiency, but pose significant security and compliance risks that companies must navigate.
fromMedium
5 months ago
Information security

Is It Time to Limit SaaS and Return to On-Prem?

SaaS adoption offers significant benefits but poses security and compliance risks that companies must address responsibly.
fromMedium
5 months ago
Information security

Is It Time to Limit SaaS and Return to On-Prem?

SaaS solutions provide modern convenience but pose significant security and compliance risks that businesses must navigate carefully.
fromMedium
5 months ago
Information security

Is It Time to Limit SaaS and Return to On-Prem?

SaaS solutions provide scalability and cost-efficiency, but pose significant security and compliance risks that companies must navigate.
fromMedium
5 months ago
Information security

Is It Time to Limit SaaS and Return to On-Prem?

SaaS adoption offers significant benefits but poses security and compliance risks that companies must address responsibly.
more#saas
fromHackernoon
2 years ago
JavaScript

Code Smell 284 - Encrypted Functions | HackerNoon

Obscured function names lead to unreadable, untrustworthy code and increased risks.
#protests
fromwww.standard.co.uk
4 months ago
London

Concerns raised over impact of Chinese 'super-embassy' on London's 'very stretched' police

Assembly members oppose the relocation of the Chinese embassy due to security and policing concerns, emphasizing prior refusals.
fromwww.bbc.com
4 months ago
London

Council opposes Chinese embassy by Tower of London

Local council opposes Google’s plan for a Chinese embassy due to security risks and potential for significant protests.
London
fromwww.standard.co.uk
4 months ago

Concerns raised over impact of Chinese 'super-embassy' on London's 'very stretched' police

Assembly members oppose the relocation of the Chinese embassy due to security and policing concerns, emphasizing prior refusals.
fromwww.bbc.com
4 months ago
London

Council opposes Chinese embassy by Tower of London

Local council opposes Google’s plan for a Chinese embassy due to security risks and potential for significant protests.
more#protests
Miscellaneous
fromwww.dw.com
4 months ago

Taiwanese soldiers charged with spying for China DW 12/06/2024

Four Taiwanese soldiers charged with espionage for leaking military secrets to Chinese agents, highlighting ongoing tensions with Beijing.
fromwww.dw.com
5 months ago
Miscellaneous

Middle East: Israel strike kills Lebanese soldier, army says DW 11/24/2024

A gunman was killed and three policemen injured in a shooting near the Israeli embassy in Amman.
Startup companies
fromTechCrunch
7 months ago

Hacker tricks ChatGPT into giving out detailed instructions for making homemade bombs | TechCrunch

ChatGPT's safety guidelines can be circumvented, posing risks for creating dangerous instructions through manipulative prompts.
#generative-ai
fromComputerworld
7 months ago
Information security

Will potential security gaps derail Microsoft's Copilot?

Microsoft's Copilot shows strong sales growth but faces serious security issues related to data access for enterprises using Microsoft 365.
fromITPro
11 months ago
Artificial intelligence

Microsoft security boss warns AI insecurity 'unprecedented' as tech goes mainstream

Generative AI adoption increases security risks, creating a complex threat landscape.
fromComputerworld
7 months ago
Information security

Will potential security gaps derail Microsoft's Copilot?

Microsoft's Copilot shows strong sales growth but faces serious security issues related to data access for enterprises using Microsoft 365.
fromITPro
11 months ago
Artificial intelligence

Microsoft security boss warns AI insecurity 'unprecedented' as tech goes mainstream

Generative AI adoption increases security risks, creating a complex threat landscape.
more#generative-ai
fromComputerWeekly.com
8 months ago
Information security

Study highlights secure software supply chain best practices | Computer Weekly

IT decision-makers prioritize improving software supply chain security in response to rising concerns about supply chain attacks.
fromTechRepublic
8 months ago
Information security

How to Offer Secure IVR Banking and Authenticate Callers

IVR banking provides convenience for customers and efficiency for banks, but comes with potential security risks.
Tech industry
fromZDNET
8 months ago

The Windows 10 clock is ticking: 5 ways to save your old PC in 2025 (most are free)

Approximately 240 million Windows 10 PCs may become obsolete when Windows 11 is mandatory, with around 40% of enterprise workstations affected.
Users facing the upgrade dilemma must consider hardware requirements, potential security risks, financial implications, and alternative options like upgrading to Windows 11 or exploring other operating systems.
France politics
fromwww.twincities.com
9 months ago

With big goals and gambles, Paris aims to reset the Olympics with a wow opening

Paris is preparing for extravagant and innovative Olympics, aiming to rejuvenate interest in the games and ensure a memorable experience for participants and spectators alike.
fromSheFinds
9 months ago
Digital life

These 3 Social Media Apps Are Selling Your Data, Security Experts Warn-Here's How To Protect Yourself

Social media apps collect user data and sell it to third parties for targeted advertising. Users can take steps to mitigate security risks.
fromTheregister
11 months ago
Cars

Attack makes autonomous vehicle tech ignore road signs

Autonomous vehicles can be attacked by manipulating CMOS sensors to distort road signs, posing serious security risks.
[ Load more ]