Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

ML-powered feature FP Remover cuts 50% of False Positives

GitGuardian is pushing its secrets detection engine precision to new heights. We enhanced our detection capabilities with Machine Learning to cut the number of false positives by half. Security and engineering teams will spend significantly less time reviewing and dismissing false alerts.

The Odd One Out: Unleashing the Power of the Unpopular Opinion

CISOs today intersect with all facets of the business, whether that be liaising with network teams to manage performance, or balancing the costs of IT operations to avoid isolation from core business functions. Successful CISOs navigate these intersections by adopting proactive strategies in order to transition from a back-office role and become recognised as valued strategic partners within their organisations.

FakePenny Ransomware, Qilin Ransomware, and More: Hacker's Playbook Threat Coverage Round-up: June 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for newly discovered or analyzed threats by the SafeBreach Labs team. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats.

Strategic Risk Management for CISOs: A Holistic and Consolidated Approach

As Chief Information Security Officers (CISOs), it's crucial to manage risks in a holistic and consolidated manner as the landscape of threats, particularly those targeting applications, continues to evolve and expand. With the increasing reliance on digital technologies, artificial intelligence (AI), and cloud-based services, the attack surface for potential cyber threats is growing and changing.

Polyfill supply chain attack embeds malware in JavaScript CDN assets

On June 25, 2024, the Sansec security research and malware team announced that a popular JavaScript polyfill project had been taken over by a foreign actor identified as a Chinese-originated company, embedding malicious code in JavaScript assets fetched from their CDN source at: cdn.polyfill.io. Sansec claims more than 100,000 websites were impacted due to this polyfill attack, including publicly traded companies such as Intuit and others.

How security teams enhance vulnerability management with Tines

When it comes to vulnerability management, time is critical - every minute a vulnerability goes unaddressed, the risk escalates. To ensure all risks are addressed, security teams need vulnerability management processes that are reliable and efficient, and, crucially, don’t drain their resources. And given that 22% of cybersecurity professionals have admitted to ignoring an alert completely, we can’t afford to rely on the human element alone.

What Drives an SME's Approach to Implementing AI?

AI’s rise in both the business and consumer worlds has been astonishingly exponential. Businesses are using AI to generate content, analyze data, automate processes, and more. But small and medium-sized enterprises (SMEs) look and act very differently from their enterprise counterparts. This prompts the question: How are SMEs approaching AI? Recent data from a 2024 JumpCloud study of SME IT may help answer it.

RAG in Production: Deployment Strategies and Practical Considerations

The RAG architecture, a novel approach in language models, combines the power of retrieval from external knowledge sources with traditional language generation capabilities. This innovative method overcomes a fundamental limitation of conventional language models, which are typically trained on a fixed corpus of text and struggle to incorporate up-to-date or specialized knowledge not present in their training data.