Category: EN

DollyWay World Domination Attack Compromises 20,000+ Sites

Since 2016, the “DollyWay World Domination” campaign has quietly compromised more than 20,000 WordPress websites worldwide, exploiting vulnerabilities in plugins and themes to redirect visitors to malicious destinations.  The operation’s name comes from a telltale code string found in infected…

How to manage your cyber risk in a modern attack surface

According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76% of organizations also reported a cyberattack due to an exposed asset in 2024, as expanding digital footprints often outpace security…

The hidden risks of LLM autonomy

Large language models (LLMs) have come a long way from the once passive and simple chatbots that could respond to basic user prompts or look up the internet to generate content. Today, they can access databases and business applications, interact…

New Research Reveals Strengths and Gaps in Cloud-Based LLM Guardrails

A comprehensive new study has exposed significant vulnerabilities and inconsistencies in the security mechanisms protecting major cloud-based large language model platforms, raising critical concerns about the current state of AI safety infrastructure. The research, which evaluated the effectiveness of content…

Trustifi Raises $25 Million for AI-Powered Email Security

Trustifi has raised $25 million in Series A funding to accelerate its product roadmap and go-to-market initiatives. The post Trustifi Raises $25 Million for AI-Powered Email Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy, and control. As more organizations experiment with verifiable credentials and self-sovereign identity models, a question emerges: Who governs the system…

Agentic AI and the risks of unpredictable autonomy

In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often fail when applied to autonomous AI systems. He explains why conventional threat modeling needs to adapt to address autonomous decision-making…

CISOs need better tools to turn risk into action

Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to a new Ivanti report. The “Exposure Management: From Subjective to Objective Cybersecurity” report points out that as companies keep adding…

Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices

Cloud security has become a critical cornerstone for organizations migrating to or operating in public cloud environments. With cyberattacks increasing significantly in recent years, implementing robust security practices across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)…