Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

The Stealthy Threat of AI Prompt Injection Attacks

Just last week the UK’s NCSC issued a warning, stating that it sees alarming potential for so-called prompt injection attacks, driven by the large language models that power AI. The NSCS stated “Amongst the understandable excitement around LLMs, the global tech community still doesn‘t yet fully understand LLM’s capabilities, weaknesses, and (crucially) vulnerabilities.

A Bucket of Phish: Attackers Shift Tactics with Cloudflare R2 Public Buckets

In our previous blog, we found a lot of phishing and scam URLs abusing Cloudflare services using pages.dev and workers.dev domains, respectively. We’re now seeing a lot of phishing emails with URLs abusing another Cloudflare service which is r2.dev.

Power of AI: Your InfoSec Professional's Trusty Sidekick

Ever wondered what the future of information security looks like? 🤖🔐 In this video, we're diving deep into the concept of having an AI companion for your InfoSec professional. Picture it: Your InfoSec expert is the brains of the operation, making all the critical decisions to keep your data safe. But right there on their shoulder is a trusty AI sidekick, analyzing mountains of data faster than you can blink and serving up all the info needed for those informed decisions.

Celebrating 100,000 scans

A little over 5 months ago, we launched our free and open code security product Bearer CLI to help teams identify both security and privacy risks in the earliest stages of the software development process. Please join us in celebrations, as today we are very excited to have achieved a key milestone in our journey - 100,000 code security scans!

Securing Cloud-Native Environments: Containerized Applications, Serverless Architectures, and Microservices

Enterprises are embracing cloud platforms to drive innovation, enhance operational efficiency, and gain a competitive edge. Cloud services provided by industry giants like Google Cloud Platform (GCP), Azure, AWS, IBM, and Oracle offer scalability, flexibility, and cost-effectiveness that make them an attractive choice for businesses. One of the significant trends in cloud-native application development is the adoption of containerized applications, serverless architectures, and microservices.

Pythons and Birds: Duolingo and Telegram Hacked?

In this week's episode, Bill and Robin explore the dangers of programmatic interfaces! The language-learning website, Duolingo, has fallen victim to an API exploit which has exposed 2.6 million user accounts, and there's threat actors on the dark web who are using Python to subversively change messages in Telegram threads. What's happening in the world, why should you care, and how can you stay protected?

Why Companies Are Migrating To AWS With a Trusted Partner

If you’re reading this article, you’re likely already considering an AWS migration for your company. You already have a handle on some of the perks migrating to AWS can have on your business but are reluctant considering how much disruption nearly every industry experienced within the last year or more. Rather than opting for more change, you might consider holding on to what you know until this period of disruption comes to an end.

How AI is Helping Cybercriminals and What You Can Do for Your Protection

Artificial intelligence is an all-encompassing tool that leverages computer systems to mimic intelligent actions like solving problems and learning. Due to its general nature, AI can aid almost any endeavor. Sadly, this includes leveraging it for malicious purposes. How do cybercrooks use AI to aid their activities? Can you do anything about it? We explore answers to both!