Dec 02, 2024The Hacker NewsAI Security / Data ProtectionArtificial Intelligence (AI) is no longer a far-off dream—it's here, changing the way we live. From ordering coffee to diagnosing diseases, it's everywhere. But while you're creating the next big AI-powered app, hackers are already figuring out ways to break it. Every AI app is an opportunity—and a potential risk. The … [Read more...] about A Guide to Securing AI App Development: Join This Cybersecurity Webinar
Development
The power of effective log management in software development and operations
,The rapid software development process that exists today requires an expanding and complex infrastructure and application components, and the job of operations and development teams is ever growing and multifaceted. Observability, which helps manage and analyze telemetry data, is the key to ensuring the performance and reliability of your applications and infrastructure. In … [Read more...] about The power of effective log management in software development and operations
Hackers Had Access to LastPass’s Development Systems for Four Days
Password management solution LastPass shared more details pertaining to the security incident last month, disclosing that the threat actor had access to its systems for a four-day period in August 2022. "There is no evidence of any threat actor activity beyond the established timeline," LastPass CEO Karim Toubba said in an update shared on September 15, adding, "there is no … [Read more...] about Hackers Had Access to LastPass’s Development Systems for Four Days
Six ways to streamline development with Elastic Cloud
Elastic helps developers enhance customer search experiences, keep mission-critical applications running smoothly, and protect against cyber threats. As many developers shift to the cloud for the speed, flexibility, and cost-efficiency, they can deploy Elastic in their preferred public cloud, or in multiple clouds, and extend the value of Elastic with cloud-native features. … [Read more...] about Six ways to streamline development with Elastic Cloud
The State of Exploit Development: Part 2
In Part 1 of this two-part blog series, we addressed binary exploitation on Windows systems, including some legacy and contemporary mitigations that exploit writers and adversaries must deal with in today’s cyber landscape. In Part 2, we will walk through more of the many mitigations Microsoft has put in place. Modern Mitigation #1: Page Table Randomization As explained in Part … [Read more...] about The State of Exploit Development: Part 2
The State of Exploit Development: Part 1
Memory corruption exploits have historically been one of the strongest accessories in a good red teamer’s toolkit. They present an easy win for offensive security engineers, as well as adversaries, by allowing the attacker to execute payloads without relying on any user interaction. Fortunately for defenders, but unfortunately for researchers and adversaries, these types of … [Read more...] about The State of Exploit Development: Part 1