Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats Report

As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our latest Q2 ThreatStats Report reveals critical trends and developments that are reshaping the security environment. Continuing from our Q1 findings, the surge in AI API vulnerabilities is not only persisting but intensifying, with an alarming increase in both the volume and severity of exploits.

The Pros and Cons of Crowdsourced Penetration Testing - Is It Right for Your Organisation?

By Michael Aguilera, Lead Penetration Tester, Razorthorn Security Over the past decade, crowdsourced penetration testing has grown in popularity because of its convenience and cost effectiveness. However, this surge in popularity does not come without its caveats. In this blog, we’ll explore the benefits and risks of crowdsourced penetration testing, compare it with traditional methods and help you make an informed decision for your organisation’s cybersecurity needs.

Black Hat 2024: AI, AI, and Everything Else

I’m back from another Black Hat! It was great seeing everyone. I put out a message on LinkedIn for people to come find me and, boy, did they. The hallway conversations were so engaging, I was sometimes late getting to the official talks, but I’m getting ahead of myself. AI was everywhere, as we’d expect, but I also sat down to listen to experts on other topics like critical infrastructure, cyber insurance, and the root causes of cybersecurity failure.

How to Find and Secure Your Network Key for Increased Online Privacy

When navigating between all your devices, one term you may have been asked to provide or seen on your tech travels—perhaps when setting up a Wi-Fi connection or troubleshooting— is the network key. A network key functions like a Wi-Fi password to secure your internet connection via a Wi-Fi router or anywhere else. As we know, anything that connects to the Internet requires a strong password to protect it from leaks, hacks, or breaches, and for that, you will need a strong network key.

Meta's Llama Technology Boosts FoondaMate | Jockey's Innovative Video Processing with LangGraph | Introducing llama-agents - Protecto - Monthly AI News

FoondaMate, a rapidly growing AI-powered study aid known as “study buddy” in Zulu, has become an indispensable resource for middle and high school students in emerging markets. Leveraging the advanced capabilities of Meta’s Llama technology, this virtual assistant provides conversational support via WhatsApp and Messenger, helping students with schoolwork and academic challenges.

A New World in Generative AI with Purple Llama - This Week in AI

Meta has announced the launch of Purple Llama, an umbrella project promoting open trust and safety in generative AI. The project features tools and evaluations designed to enable developers to deploy generative AI models and experiences responsibly in line with best practices outlined in Meta’s Responsible Use Guide.

SearchGPT, Llama 3.1 & GPT-4o Mini - Monthly AI News By Protecto

OpenAI has launched a prototype called SearchGPT, a new AI-driven search tool that integrates advanced AI capabilities with real-time web information. This temporary prototype, currently available to a select group of users and publishers, aims to enhance how people find information online by providing fast, accurate answers with precise citations. The ultimate goal is to gather feedback and refine these features before integrating them into the broader ChatGPT platform.

Microsoft Remote Code Execution for Windows TCP/IP IPv6

Over the past three years, the second Tuesday of each month has turned into a hectic period of planning and remediation, driven by a 25% average annual growth rate in CVEs. Just last Tuesday, Microsoft revealed a critical TCP/IP remote code execution (RCE) vulnerability in the IPv6 stack, which has a CVSS score of 9.8 due to its criticality and ease of exploitation. For a more in-depth look, we recommend these resources.

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

In early 2021, a new vulnerability, identified as CVE-2021-27928, was discovered and published. It affects multiple versions of the open-source relational database management systems (RDMBS) MariaDB and Percona Server, and the wsrep (write set replication) plugin for MySQL. Fortunately, security professionals swiftly released a patch to ensure that affected systems could be updated to mitigate risks.