Information Security profile picture

Thread Hijacking: Phishes That Prey on Your Curiosity Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an existing conversation between the sender and someone else. These missives draw on the recipient's natural curiosity about being copied on a private discussion, which is modified to include a malicious link or attachment. Here's the story of a recent thread hijacking attack in which a journalist was copied on a phishing email from the unwilling subject of a recent scoop.
https://krebsonsecurity.com/20....24/03/thread-hijacki

image

Discover the world at Altruu, The Discovery Engine
    Information Security profile picture

Beyond the Black Box: How XAI is Building Confidence Written by Dr. Chantal Spleiss, Co-Chair for the CSA AI Governance & Compliance Working Group.While "AI" has become a broadly used word, there are key distinctions within AI to keep in mind. Narrow AI systems excel at specific tasks, like playing chess or recognizing objects in images. Generative AI (GenAI) is a rapidly growing field that involves creating new text, images, code, or other forms of content. These systems pose unique challenges for understanding their output and ensuring it...
https://cloudsecurityalliance.....org/articles/beyond-


Discover the world at Altruu, The Discovery Engine
    Information Security profile picture

6 Surprising Findings from the CSA State of Security Remediation Report Originally published by Dazz.Written by Julie O’Brien, CMO, Dazz.As more companies shift left and embrace hybrid cloud operations, the need for security visibility across the entire code-to-cloud environment is critical for staying on top of vulnerabilities and reducing exposure.The CSA State of Security Remediation survey validates the challenges that we know organizations are facing, as well as what’s needed to solve them. This post highlights six main findings observed from the CSA survey....
https://cloudsecurityalliance.....org/articles/6-surpr


Discover the world at Altruu, The Discovery Engine
    Information Security profile picture

DinodasRAT Linux implant targeting entities worldwide In this article, we share our analysis of a recent version of the DinodasRAT implant for Linux, which may have been active since 2022.
https://securelist.com/dinodas....rat-linux-implant/11

image

Discover the world at Altruu, The Discovery Engine
    Information Security profile picture

Explore cloud security in the age of generative AI at AWS re:Inforce 2024 As the Chief Information Security Officer (CISO) at AWS, I’m personally committed to helping security teams of all skill levels and sizes navigate security for generative artificial intelligence (AI). As a former AWS customer, I know the value of hands-on security learning and talking in-person to the people who build and run AWS security. That’s […]
https://aws.amazon.com/blogs/s....ecurity/explore-clou

image

Discover the world at Altruu, The Discovery Engine