article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

And the most prevalent malware in Q4. from CSO Magazine , The Register , SC Magazine and Help Net Security , as well as the videos below. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And much more!

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

The attack against Microsoft began in November 2023, when Midnight Blizzard – also known as Nobelium, Cozy Bear and APT29 – compromised a legacy, non-production test account that lacked multi-factor authentication protection. military have had access to Malware Next-Generation Analysis since November. Users from the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Block legacy authentication protocols. More resources on cloud configuration best practices: “ Hardening and monitoring cloud configuration ” (SC Magazine). 7 mistakes CISOs make when presenting to the board ” (CSO Magazine). “ Deliver Your Board Message with Context and Confidence” (SC Magazine). Systems management.

Cloud 52
article thumbnail

Cybersecurity Snapshot: Discover the Most Valuable Cyber Skills, Key Cloud Security Trends and Cyber’s Big Business Impact

Tenable

Foote Partners: bonus disparities reveal tech skills most in demand in Q3 ” (CIO Magazine). As cloud environments become more attractive for attackers, they will develop more sophisticated tools and malware tailored for breaching cloud environments. Cyber increasingly a growth enabler, Deloitte study shows ” (Technology Magazine).

Trends 98
article thumbnail

Cybersecurity Snapshot: ChatGPT Gets So-So Grade in Code Analysis Test, while JCDC Pledges To Focus on Protecting Critical Infrastructure

Tenable

outlines four core areas of repository security – authentication, authorization, general capabilities, and command-line interface tooling. Not So Fast. ” The framework, now in version 0.1, It also details four levels of security maturity – from level zero to level three – for each area.

ChatGPT 71
article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

AI threats discussed in the document include: AI model data poisoning Input manipulation, including prompt injection Generative AI hallucination outputs Privacy and intellectual property violations Theft of AI models And here are some of the guide’s recommendations: Implement mitigations from cybersecurity frameworks relevant to your organization, (..)

article thumbnail

Cybersecurity Snapshot: Strengthen Identity and Access Management Security with New CISA/NSA Best Practices

Tenable

For more information, you can read the full report and the report announcement , as well as coverage from The Record , Infosecurity Magazine , SecurityWeek and International Railway Journal. Now that they're getting better at writing computer code, [they] could be used for offensive cyberattacks."