Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Feroot Security Research Reveals DeepSeek AI's Hidden Data Pipeline to China

ABC Good Morning America featured an exclusive report this morning highlighting Feroot’s discovery of concerning code within DeepSeek’s AI platform. Feroot, a leading cybersecurity firm, uncovered hidden capabilities enabling direct data transmission from DeepSeek to China Mobile servers.

AP News - Feroot Research Uncovers DeepSeek's Connection to Chinese State-Owned Telecom

Researchers at Feroot Security have identified computer code within the web-based version of DeepSeek’s AI chatbot that could potentially send user login information to China Mobile, a Chinese state-owned telecommunications company. This discovery raises significant privacy and national security concerns, particularly as China Mobile has been barred from operating in the United States due to its alleged ties with the Chinese government and military.

Boost Cloud Security Without Bugging Your Developers

Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies heighten security requirements in the cloud. If developers find these security measures cumbersome, creating hurdles that plague their progress, they will likely bypass them altogether.

Strategies and Tradeoffs when Running AI Models on Lean Resources

This article explores the recommended infrastructure for AI workloads, strategies to optimize performance on less expensive servers, and trade-offs in terms of cost and results. We’ll also provide examples of AWS EC2 instance types and pricing to illustrate practical options.

Europe Retail Threat Landscape 2024

As one of the world’s largest and most advanced economic regions, the European region consists of 37 countries including the 27 European Union (EU) countries. With some of the most important economies in the world, Europe remains a prime target for cyber adversaries and state actors. The retail industry faces a constantly evolving array of threats among its major sectors.

Simplify your SIEM migration to Microsoft Sentinel with Datadog Observability Pipelines

As cyberattacks rise in number and sophistication, many CISOs are pushing their organizations to adopt modern SIEM solutions to better monitor and investigate threats to their applications and infrastructure. Enterprises with a large Microsoft Azure or Windows-based footprint in particular are increasingly eyeing Microsoft Sentinel to consolidate their security stack and workflows.

What Is CTEM? Understanding Gartner's CTEM Framework

In the world of cybersecurity, nothing stays still for long. The endless proliferation of new technologies and rapidly shifting threat landscapes forces organizations to continually reevaluate their approach to risk. Over the last two decades, security teams have leaned heavily on vulnerability management (VM) solutions to identify, classify, and patch software vulnerabilities on internal assets.

Penetration Testing ROI: How to Convince Leadership to Invest in Cybersecurity

While Chief Information Security Officers (CISOs) know how crucial a consistent enterprise penetration testing program is to their cybersecurity program, convincing their fellow leaders and board members to invest in pen testing amid other budget demands can be challenging. The key is to speak to these leaders in terms they readily understand, focusing largely on risk.

Cloudflare's commitment to advancing Public Sector security worldwide by pursuing FedRAMP High, IRAP, and ENS

Today, we announced our commitment to achieving the US Federal Risk and Authorization Management Program (FedRAMP) - High, Australian Infosec Registered Assessors Program (IRAP), and Spain’s Esquema Nacional de Seguridad (ENS) as part of Cloudflare for Government. As more and more essential services are being shifted to the Internet, ensuring that governments and regulated industries have industry standard tools is critical for ensuring their uptime, reliability and performance.