Is there any resources that discover LLM-based threats in Cybersecurity recently? [closed]

I wondered If there are some official/reliable resources to discover statistics regarding new threats and attack vectors generated by GenAI or Large Language Models (LLM) that recently opened a new era and attack surface.

Continue reading Is there any resources that discover LLM-based threats in Cybersecurity recently? [closed]

Are polyglot microservices (multiple technologies) more secure than using a single technology framework?

As a full-stack cloud-native (AWS, Azure, and GCP) polyglot (Rust, Golang, Python, and Java) microservices developer, the nagging question that I have is if the use of multiple technology frameworks vs single language (e.g., Java) have inc… Continue reading Are polyglot microservices (multiple technologies) more secure than using a single technology framework?

Sumo Logic Finds Attack Surface Expanding

An annual report published today by Sumo Logic, a provider of security tools delivered as a cloud service, highlights the degree to which security has fundamentally shifted in the age of the cloud. Based on an analysis of data culled from more than 2,… Continue reading Sumo Logic Finds Attack Surface Expanding

Does additional SSH access on top of HTTPS improve or harm the security of a self hosted Git server?

We have a self hosted git server in our company. It is reachable over the internet because our developers work together with external consultants, developers and other persons. Between the internet and the internal server is a reverse prox… Continue reading Does additional SSH access on top of HTTPS improve or harm the security of a self hosted Git server?

(Podcast) Episode 01: What “Attack Surface” Means in 2020

Listen and subscribe to our new podcast! Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each ep… Continue reading (Podcast) Episode 01: What “Attack Surface” Means in 2020

ThreatList: Admin Rights for Third Parties is the Norm

The majority give outside partners, contractors and suppliers administrative access — without strong security policies in place. Continue reading ThreatList: Admin Rights for Third Parties is the Norm

Employees: Part of the Attack Surface

Employees pose a huge risk to an organization. For years, the Verizon Data Breach Investigations Report (DBIR) has listed employees or insiders as a top threat. It appears that leadership is finally starting to pay attention to this threat. According … Continue reading Employees: Part of the Attack Surface