Normal view

There are new articles available, click to refresh the page.
Today — 1 June 2024Main stream

The Observer view on Donald Trump: utterly unfit for office, he should quit the race for the White House

1 June 2024 at 14:15

Teflon Don has become Felon Don, but the US constitution has no objection to him holding the highest office

It was the moment America, or at least America’s politicians and media, had been waiting for. It was the day justice finally caught up with Donald Trump. The former president’s manipulation of the 2016 election, by hushing up a sex scandal that threatened his chances, and his attempts to discredit a criminal justice system intent on punishing him, was famously thwarted. It was an all-time presidential and judicial first, a historic result that transformed Teflon Don into Felon Don, thanks to a jury of 12 ordinary men and women and a brave prosecutor, Alvin Bragg.

Looked at another way, however, last week’s much anticipated dramatic denouement of the criminal trial of the New York playboy, billionaire and presumptive 2024 Republican presidential candidate may turn out to be less pivotal than anticipated. According to the US networks, most Americans tuned out weeks ago, not least because cameras were barred from the Manhattan courtroom. One not untypical public survey found that 67% of respondents said a conviction would make no difference to how they voted this autumn. The 34 guilty verdicts were an overnight sensation. But they may not significantly shift the political dial.

Continue reading...

💾

© Photograph: John Nacion/REX/Shutterstock

💾

© Photograph: John Nacion/REX/Shutterstock

Why Next-Gen Data Intelligence Platforms are a Game Changer for Businesses?

Next-Gen Data Intelligence Platforms

By Siddharth Deshmukh, Chief Operating Officer, Clover Infotech In today’s competitive business landscape, making informed decisions and managing resources efficiently is more critical than ever. However, many businesses face challenges with data silos and the complex integration of diverse technologies for data management and analytics. This is where next-gen data intelligence platforms come into play. They enable businesses to transcend traditional data and analytics applications, providing insights tailored to users' roles and workflows.

Why Next-Gen Data Intelligence Platforms Are Game Changers

They enhance data integration and management Next-gen data intelligence platforms integrate data from a variety of sources, both structured and unstructured, including IoT devices, social media, and external databases, offering a comprehensive view of business operations. By helping businesses understand how their data relates to different processes and goals, these platforms provide a holistic perspective on various aspects such as customers, products, accounts, suppliers, and employees. This enables businesses to make quick, informed decisions. They leverage predictive and prescriptive AI/ML models Through predictive and prescriptive AI models, these platforms can predict trends, customer behavior, and potential disruptions, allowing businesses to proactively address issues. Further to prediction, these platforms can suggest actions to optimize performance, enabling enterprises to improve efficiency and reduce costs. They facilitate improved decision-making With advanced analytics and real-time data, decision-makers have access to accurate and up-to-date information. Further, virtualization tools help in interpreting complex data sets, making it easier for stakeholders to understand insights and take suitable actions. They automate processes and boost efficiency These platforms can automate routine tasks and processes, reducing manual effort and minimizing human errors. By streamlining processes and providing actionable insights, these platforms help optimize resources and improve operational efficiency. They offer scalability and flexibility Next-gen data intelligence platforms are built to scale with the business, accommodating growth and changing business needs. They also offer flexibility in deployment options (cloud, on-premise, hybrid), and can adapt to various business models and processes They augment user experience Since such platforms offer customized experiences to users based on their roles and preferences, they improve usability and satisfaction. With cloud-based solutions, users can access data and receive actionable insights from anywhere. This facilitates seamless cohesion and collaboration. Many technology leaders such as Microsoft, Oracle, and Google have their data intelligence platforms combining data integration, analytics, AI models, and intelligent applications to enable customers to achieve better outcomes. Oracle’s Fusion Data Intelligence Platform delivers businesses data-as-a-service with automated data pipelines, 360-degree data models, rich interactive analytics, AI/ML models, and intelligent applications. In conclusion, next-gen data intelligence platforms empower existing systems and processes with advanced capabilities that drive smarter, faster, and more strategic business operations. By leveraging real-time data, advanced analytics, and automation, businesses can enhance their decision-making processes, optimize operations, and maintain a competitive edge in an increasingly data-driven world. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

TCE Cyberwatch: Weekly Roundup Highlights AI Risks, Data Breaches, and Legal Battles

TCE Cyberwatch

This week on TCE Cyberwatch, we are looking at legal controversies that are now on the rise due to the introduction of new features in AI. Famous actors like Scarlett Johansson face the burnt of it, along with Governments who are getting together to discuss the impact of AI on important world events. Staying informed to know what is going on behind the scenes of things you may be using, watching, or partaking in is important. Vulnerabilities and breaches are constantly being found and occurring. In very common and large companies like Medisecure, it is important to ensure you know if something like that can be on its way to affect you. So, to stay updated, The Cyber Express has compiled the weekly happening in the cybersecurity world in the form of TCE Cyberwatch. Read on to find out what are they:

TCE Cyberwatch: A Weekly Round-Up

AI's Dark Side: Experts Warn of Cybercrime, Election Attacks at Congressional Hearing

At a U.S. congressional hearing on AI misuse, data security and privacy experts discussed AI’s diverse threats, including cybercrime, election interference, and nation-state attacks. The House Committee on Homeland Security announced their aim of incorporating AI into upcoming legislation, and panelists emphasized that AI has empowered cybercriminals, making it crucial to integrate AI into cybersecurity measures. The spokesperson from Palo Alto Networks stressed the need for secure AI development and oversight. Concerns about election security were raised, and the Centre for Democracy and Technology proposed guidelines for responsible AI use, emphasizing proper training data, independent testing, and human rights safeguards. They warned against the hasty deployment of AI, advocating for a careful approach to ensure long-term benefits. Read More

Courtroom Recording Software Hit by Supply Chain Attack, Thousands Potentially Affected

Hackers compromised Justice AV Solutions (JAVS), a widely-used courtroom recording platform, by inserting a backdoor in a software update. JAVS software, installed in over 10,000 locations globally, was affected when hackers replaced the Viewer 8.3.7 software with a compromised file. JAVS responded by removing the affected version from its website, resetting passwords, and auditing its systems. The company assured that current files are malware-free and urged users to verify their software is digitally signed. Cybersecurity firm Rapid7 identified the backdoor as linked to the GateDoor and Rustdoor malware families, often used by the ShadowSyndicate cybercrime group. They advised users to reimage affected systems and reset credentials, as merely uninstalling the software is insufficient. Read More

Australian Regulator Sues Optus Over Massive Data Breach of 10 Million Customers

Australia's media regulator is suing telecom carrier Optus, owned by Singapore Telecommunications, over a massive data breach in September 2022. The breach exposed the personal information of 10 million Australians, including addresses, passports, and phone numbers. Following the breach, Prime Minister Anthony Albanese advocated for stricter privacy laws to ensure companies notify banks quickly in such incidents. The Australian Communications and Media Authority claims Optus failed to protect customer data from unauthorized access. Optus, which has been cooperating with authorities, stated it cannot yet determine potential penalties and plans to defend itself in court. The company has been under scrutiny recently due to a separate 12-hour network blackout affecting over 10 million customers. Read More

Critical WordPress Vulnerabilities: Update Plugins Immediately!

The Cyber Security Agency of Singapore has issued an urgent alert regarding critical vulnerabilities in several WordPress plugins. These vulnerabilities pose significant security risks, potentially allowing unauthorized access and exploitation. To address these issues, security updates have been released. SingCERT has identified nine critical vulnerabilities, including those allowing arbitrary file uploads and SQL injection, and has provided mitigation strategies. Users are strongly advised to update to the latest plugin versions immediately. Additional measures, such as virtual patching, can offer temporary protection. Regular updates and monitoring are essential for safeguarding WordPress websites against potential threats. For more details, users should consult the respective plugin documentation and developer updates. Read More

Ransomware Attack on Spanish Bioenergy Plant Highlights ICS Vulnerabilities

A ransomware attack by the Ransomhub group on the Industrial Control Systems (ICS) of a Spanish bioenergy plant underscores the risks of cyberattacks on critical infrastructure. The attack targeted the SCADA system, crucial for managing the plant's operations, encrypting over 400 GB of data and disrupting essential functions. Organizations must fortify defenses by implementing robust network segmentation, regular software updates, secure remote access, and diligent monitoring. Developing and testing incident response plans are essential to minimize the impact of such attacks. This incident highlights the need for heightened vigilance and proactive measures to protect critical infrastructure from cyber threats. Read More 

Islamabad's Safe City Project Exposed: Hack Highlights Security Failures

Islamabad’s Safe City Authority faced a severe disruption after hackers breached its online system, forcing an immediate shutdown. The project, launched with Chinese financial support, aimed to enhance security with advanced technology, including CCTV cameras and facial recognition. The hack exposed vulnerabilities, as hackers accessed sensitive databases and compromised crucial systems like criminal records and human resources. Despite a firewall alert, the lack of backup servers necessitated a complete shutdown. The breach affected key services, revealing weak security practices, such as simple login credentials and outdated software. The isolated camera management system remained secure. Police confirmed the breach and have taken steps to improve security. The project, controversial due to transparency issues and cost overruns, has faced criticism for not achieving its security goals. Financial difficulties and operational setbacks further marred its effectiveness, and the recent hack has intensified scrutiny of the initiative. Read More 

Massive Data Breach at Pharma Giant Cencora Exposes Millions

The Cencora data breach has impacted more than a dozen pharmaceutical companies, including Novartis and GlaxoSmithKline, leaking personal and health data of hundreds of thousands. Cencora, formerly AmerisourceBergen, and its Lash Group affiliate revealed the breach to the SEC, indicating data exfiltration from its systems. With operations in 50 countries and significant revenue, Cencora did not initially detail the breach's scope but later notifications identified 15 affected companies. At least 542,000 individuals' data, including names, addresses, birthdates, health diagnoses, and prescriptions, were compromised. Despite the breach, no misuse or public disclosure of the data has been reported. The company has offered affected individuals credit monitoring and identity theft protection services and is enhancing its security measures. This incident highlights ongoing vulnerabilities in the healthcare sector, which has seen several recent cyberattacks. Read More

MediSecure Ransomware Breach: 6.5 TB of Patient Data Listed for Sale on Dark Web

MediSecure, an Australian digital prescription service provider, confirmed that data stolen in a recent ransomware attack is for sale on the dark web. The breach, originating from a third-party provider, exposed personal and health information of patients and healthcare providers up to November 2023. The hacker, Ansgar, began selling the data for $50,000 on May 23, claiming to possess 6.5 terabytes of sensitive information. MediSecure alerted the public, urging them not to seek out the stolen data, which includes names, addresses, emails, phone numbers, insurance numbers, prescriptions, and login details. Australia's National Cyber Security Coordinator and police are investigating. MediSecure emphasized that the breach does not affect the Australian healthcare system's ongoing operations or access to medication. They are working to notify affected individuals and assure them of measures to protect against further risks. Read More

OpenAI Backtracks on Voice Assistant After Scarlett Johansson Raises Concerns

OpenAI's new voice assistant debuts with a voice similar to actress Scarlett Johansson's, who expresses shock and anger, as she had previously declined an offer to voice ChatGPT, especially given her role in the 2013 film *Her*. OpenAI's CEO, Sam Altman, seemingly acknowledged this connection in a social media post. Despite OpenAI's claim that the voice belonged to another actress, Johansson's concerns highlight broader tensions between AI and the creative industries. OpenAI has since dropped the controversial voice and is working on tools for content creators to manage their work's use in AI training. The incident underscores the need for stronger legal protections, like the No Fakes Act, to safeguard personal likenesses. Legal experts believe Johansson might have grounds for a lawsuit, referencing similar past cases like Bette Midler's against Ford. As AI technology advances, such legal disputes are expected to increase. Read More

To Wrap Up

Here at TCE, we hope these weekly roundups continue to keep you informed about the latest in the cybersecurity industry. Our coverage not only includes cyberattacks but also developments in the legal aspects of AI, which are becoming increasingly important as technology evolves. We aim to keep you updated on new developments in the industry, including impacts on companies and the general public, such as recent events involving Medicare. Our goal is to ensure everyone stays safe and knows the appropriate responses if affected by these situations.
Yesterday — 31 May 2024Main stream

The Guardian view on Donald Trump’s conviction: a criminal unfit to stand or serve | Editorial

By: Editorial
31 May 2024 at 13:30

The prosecution and the guilty verdicts are unprecedented. But making history is not the same as shifting election outcomes

Guilty. The New York jury’s unanimous verdicts on 34 counts mean that Donald Trump is not only the first sitting or former US president to be prosecuted in a criminal trial, but the first to be convicted.

Trump was found to have falsified business records to hide $130,000 of hush money paid to cover up a sex scandal he feared might hinder his run in 2016. Before his entry into politics, it would have been taken for granted that such charges would kill a campaign. Yet Trump is running for the White House as a convicted criminal. If he is jailed when he is sentenced in July – which most experts think unlikely – it is assumed that he would continue. If anything, the prospect of such a sentence spurs him on.

Continue reading...

💾

© Photograph: Angela Weiss/AFP/Getty Images

💾

© Photograph: Angela Weiss/AFP/Getty Images

The Guardian view on The Vampire’s Wife: fashion that captured the zeitgeist | Editorial

By: Editorial
31 May 2024 at 13:25

The luxury label that created a Vogue dress of the decade may have collapsed, but its frocks will live on in wardrobes and art history

The sudden demise of the fashion label The Vampire’s Wife this month drove a stake through the heart of a cultural fairytale. The label’s combination of witchy creative flair, celebrity and retail luxury had caught the imagination of a miserable decade. It was founded in 2014 by the model turned designer Susie Cave and named after a novel abandoned by her husband, the musician Nick Cave.

Its ruffled frocks took only four years to become the stuff of royalty, on the Hollywood red carpet or at the wedding of Prince Harry and Meghan Markle (where three guests wore them). In 2020, they were accessorised for the Covid era with bespoke face masks; they also hit the high street in recycled silver nylon in a deal with H&M, selling out in 24 hours. Vogue made one design, the Falconetti, its “dress of the decade”, and a shimmering emerald green Falconetti was immortalised in paint in the first official portrait of the then Duke and Duchess of Cambridge.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: H&M

💾

© Photograph: H&M

Before yesterdayMain stream

The Guardian view on India’s election: Narendra Modi’s audacity of hate | Editorial

By: Editorial
30 May 2024 at 13:52

India’s prime minister encourages a belief in his divinity, leading followers to think it is God’s purpose to spread fear and loathing

“No party or candidate shall include in any activity which may aggravate existing differences or create mutual hatred or cause tension between different castes and communities, religious or linguistic.” So reads the rulebook for Indian elections. Has anyone told Narendra Modi? India’s prime minister has resorted to overtly Islamophobic language during the two-month campaign, painting India’s 200 million Muslims as an existential threat to the Hindu majority. Laughably, the body charged with conducting free and fair polls did issue a feeble call for restraint from “star campaigners”. With the Indian election results out next week, one commentator warned Mr Modi has “put a target on Indian Muslims’ backs, redirecting the anger of poor and marginalised Hindu communities away from crony capitalists and the privileged upper castes”.

Mr Modi’s tirades are meant to distract an electorate suffering from high inflation and a lack of jobs despite rapid economic growth. His Bharatiya Janata party’s political strategy is to emphasise threats to Hindu civilisation, and the need for a united Hindu nation against Muslims. However, Mr Modi has fused this Hindu nationalism with the idea that he was sent by God. The Congress party’s Rahul Gandhi, his main opponent, suggested that anyone else making such a claim needed to see a psychiatrist.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Debajyoti Chakraborty/NurPhoto/REX/Shutterstock

💾

© Photograph: Debajyoti Chakraborty/NurPhoto/REX/Shutterstock

The Guardian view on the London press: the capital needs its own news | Editorial

By: Editorial
30 May 2024 at 13:48

The Evening Standard has lost its sparkle, but Londoners should not be left without a daily news source

The decision by the Evening Standard to stop producing a daily edition, from Monday to Friday, leaves Londoners without their own general newspaper. Under its current owners, the Standard, which is 197 years old, has faded to a shadow of its former, showy self. But this is a dismaying move all the same. A city of London’s size and importance, with a mayoralty and 32 borough councils, ought to have a dedicated print news outlet aside from the business-focused City AM. This is not just a matter of holding politicians, local services and businesses to account. It is about the city as a place with its own civic identity, its own arts and food scenes and sporting events, as well as serious problems including a housing affordability crisis.

The title has faced the same pressures as other print media, above all falling sales and advertising due to intense competition from digital rivals. It was given an injection of life when it went free in 2009 and pivoted to an advertising-led model. But the combination of higher newsprint costs, wifi on the London Underground and increased home working have finished it off. While a weekly version is promised, along with a boost to its online presence, the 15 years of Lord Lebedev’s majority-ownership do not inspire confidence. He spent tens of millions on the loss-making TV project London Live while slashing editorial budgets. His decision to make former chancellor George Osborne editor was not popular with staff, but in line with his apparent desire to use the title to boost his social standing. According to its accounts, the business has lost £84.5m in six years.

Continue reading...

💾

© Photograph: Carl Court/Getty Images

💾

© Photograph: Carl Court/Getty Images

The Guardian view on Macron, Scholz and Europe’s future: a question of ambition | Editorial

By: Editorial
29 May 2024 at 13:28

On a state visit to Germany, the French president called for an EU reset to combat the threat of the radical right. He should be listened to

Ahead of the most consequential European elections of recent times, the signs of a significant rightward shift are unmistakable. In France, Marine Le Pen’s Rassemblement National is now polling more than double its nearest rivals and looks set to record a disturbingly decisive victory. In Germany, the far-right AfD is out-polling all three parties in the governing coalition, despite being embroiled in a series of high-profile scandals.

Whether such parties will be capable of forming a cohesive force after the election is another matter. As a Guardian investigation into their funding reveals on Thursday, the financial backing is there. But the pan-European radical right is split into fractious and rivalrous blocs, and internally divided over issues such as the war in Ukraine. The AfD has just been expelled from the Identity and Democracy group, after its former lead candidate, Maximilian Krah, sought to exculpate the actions of some members of the Nazi SS. Nevertheless, the rise of nationalist, populist and Eurosceptic parties across the continent has become a defining phenomenon of the times.

Continue reading...

💾

© Photograph: Lafargue Raphael/ABACA/REX/Shutterstock

💾

© Photograph: Lafargue Raphael/ABACA/REX/Shutterstock

The Guardian view on Diane Abbott: an unnecessary mess of Labour’s own making | Editorial

By: Editorial
29 May 2024 at 13:25

Sir Keir Starmer should be concentrating on winning power, not becoming distracted by rows over MP selections

Sir Keir Starmer has been having a good campaign. Rishi Sunak’s gamble on an early election has done little to dent Labour’s enormous poll leads. The Labour leader is becoming more fluent in media interviews and more confident meeting voters in his minutely stage-managed appearances over pints and in town halls. So the unnecessary mess surrounding the future of Diane Abbott in the Labour party is an unwelcome reminder of Starmerite intolerance.

Ms Abbott is a significant figure in the Labour party, having become the country’s first black female MP in 1987. Last year she was suspended from her party after she claimed that Jewish people and travellers did not experience racism “all their lives”. This was an offensive mistake, and she rightly apologised immediately. She was suspended from the party, and Labour’s national executive committee launched an investigation into the affair, which was completed by December, resulting in a formal warning to the MP. She subsequently in February took a two-hour online antisemitism awareness training course. That should have been the end of the matter.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Beresford Hodge/Reuters

💾

© Photograph: Beresford Hodge/Reuters

The Guardian view on the Rafah offensive: crossing US red lines should have consequences | Editorial

By: Editorial
28 May 2024 at 13:47

Joe Biden should back a UN security council resolution to end the fighting in Gaza rather than shielding Israel from criticism

The Israeli strike that killed at least 45 displaced Palestinians, many of them women and children, at a tent camp in Rafah this weekend clearly crossed Joe Biden’s “red line” over the need to protect civilians in the Gaza conflict. France’s Emmanuel Macron did not doubt what should happen next. “These operations must stop,” he posted on X. “There are no safe areas in Rafah for Palestinian civilians. I call for full respect for international law and an immediate ceasefire.”

Those in Israel who believe that they still need to make an appearance of deference towards US sentiments pleaded that the whole episode was a “mishap” rather than a deliberate political insult. Mr Biden is inclined to give Israel’s forces the benefit of the doubt, and give himself wriggle room to say his line hadn’t been crossed. Despite the international outcry over Sunday’s deadly blast, Israel stepped up its military offensive on Tuesday, sending tanks into Rafah and leaving a score more civilians dead when it apparently struck a tented area.

Continue reading...

💾

© Photograph: Diane Krauthamer/ZUMA Press Wire/REX/Shutterstock

💾

© Photograph: Diane Krauthamer/ZUMA Press Wire/REX/Shutterstock

The Guardian view on the Tory rail legacy: a dismal record of failure | Editorial

By: Editorial
28 May 2024 at 13:47

A report by cross-party MPs offers a damning verdict, six years after a ‘root and branch’ review called for wide-ranging reform

The vertiginous pace of events since Boris Johnson’s 2019 election victory has been such that pledges made only a few years ago seem almost to belong to another era. “I am a great believer in rail,” said Mr Johnson in 2021, announcing a major programme of reforms to the country’s network, “but for too long passengers have not had the level of service they deserve.”

Travellers habituated to late-running, overcrowded and over-expensive trains knew how right he was. But to reprise the famous assertion of Mr Johnson’s predecessor, Theresa May, three years on “nothing has changed”. This week, the last word on successive Conservative governments’ incompetent handling of the railways was delivered by the House of Commons public accounts committee. The MPs’ damning report concluded that since the “root and branch” Williams review was commissioned in 2018, following timetabling mayhem in the north of England, “very little” has been achieved, and that “no one is putting the needs of passengers and taxpayers first”.

Continue reading...

💾

© Photograph: Andy Rain/EPA

💾

© Photograph: Andy Rain/EPA

Industry Leaders at World CyberCon Share Insights on Cyber Risk Management

META Cybersecurity

The grandeur of Al Habtoor Palace in Dubai set the stage for one of the most significant cybersecurity events in the Middle East: the World CyberCon 3.0 META Cybersecurity conference. This prestigious event brought together leading cybersecurity professionals and industry experts from around the world to discuss pressing issues and emerging trends in the field. Among the various World CyberCon META Edtion sessions, a panel discussion on cyber risk scoring drew substantial attention, underling its critical importance in today's digital landscape. During the session, Waqas Haider, the CISO of HBL Microfinance Bank, served as the moderator and steered the conversation among the panelists that featured Beenu Arora, Co-founder and CEO of Cyble; Azhar Zahiruddin, Director of Data Protection and Group DPO at Chalhoub Group; Ankit Satsangi, Director at Beeah Group; and Suhaila Hareb, ISR Auditor at Dubai Electronic Security Center.

Understanding Cyber Risk Scoring at World CyberCon META Cybersecurity Conference

Beenu Arora, the CEO of Cyble, delivered a global perspective that resonated profoundly with the audience. He highlighted the staggering statistics regarding data breaches over the past few years. According to statistics, over the past thousand days, more than 50,000 companies worldwide have fallen victim to data breaches. “In the last two and a half years, let’s say, the last thousand days. Can anybody guess how many companies have reportedly been breached? The number we have exactly at the moment is 50 thousand! So 50 thousand companies, globally, have been breached, in the last thousand days”, said Beenu Arora at The Cyber Express META Cybersecurity Conference in Dubai. Azhar Zahiruddin emphasized the importance of understanding the evolving nature of cyber threats and the necessity of robust data protection frameworks. He stressed that organizations must stay ahead of threat actors by continuously updating their security measures and protocols. Suhaila Hareb provided insights into the regulatory landscape and the role of compliance in enhancing cybersecurity defenses. She highlighted the significance of adhering to international standards and the need for regular audits to ensure that security measures are effective and up-to-date. Ankit Satsangi discussed practical strategies for improving cyber risk scoring mechanisms. He recommended a multi-layered approach to cybersecurity that integrates advanced technologies, employee training, and proactive threat intelligence. The panelists collectively underline the importance of cyber risk scoring as a tool for organizations to assess and manage their cybersecurity risks. Effective risk scoring enables companies to identify vulnerabilities, prioritize their security investments, and respond more swiftly to potential threats. Moreover, throughout the discussion, a common theme emerged: the need for better defense mechanisms to fight against online threats. The experts agreed that while technological advancements are crucial, human factors such as employee awareness and training play an equally vital role in maintaining enhanced cybersecurity. [caption id="attachment_71349" align="aligncenter" width="2800"]World CyberCon META (L-R: Suhaila Hareb - ISR Auditor, Dubai Electronic Security Center; Ankit Satsangi - Director, Beeah Group; Waqas Haider - CISO, HBL Microfinance Bank (Moderator), Azhar Zahiruddin - Director of Data Protection - Group DPO, Chalhoub Group and Beenu Arora - Co-founder and CEO, Cyble)[/caption]

A Call for Enhanced Defense Mechanisms

The World CyberCon 3.0 META Cybersecurity conference showcased the latest advancements and strategic insights in the field of cybersecurity. The panel on cyber risk scoring highlighted the critical role of this practice in helping organizations navigate the complex threat landscape. As cyber threats continue to evolve, the insights shared by these industry leaders provide valuable guidance for organizations seeking to bolster their cybersecurity defenses. By adopting comprehensive risk scoring mechanisms and staying informed about emerging threats, businesses can better protect their digital assets and maintain resilience in an increasingly interconnected world. Apart from this, the META edition of World CyberCon holded several interesting sessions on cybersecurity in the Middle East. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Women Take Center Stage at World CyberCon: Panel Explores AI for Threat Detection

World CyberCon META Edition

The 2024 World CyberCon META Edition, a resounding success held at Al Habtoor Palace in Dubai, featured a prominent all-women panel discussion titled "Strategic Investments in Cybersecurity: Leveraging AI and ML for Enhanced Threat Detection." The panel, moderated by Jo Mikleus, Senior Vice President of Cyble Inc., featured contributions from an array of distinguished experts including Sithembile (Nkosi) Songo, Chief Information Security Officer at ESKOM; Dina Alsalamen, VP and Head of Cyber and Information Security at Bank ABC; Afra Mohammed Almansoori, Business Analyst at Digital Dubai; and Irene Corpuz, Co-Founder of Women in Cyber Security Middle East. The session commenced with exploring how AI and machine learning (ML) are revolutionizing threat detection and response in cybersecurity. Afra Mohammed Almansoori highlighted the transformative impact of these technologies: "AI isn't just a substitute; it's a game-changer for cybersecurity. By harnessing AI and machine learning, we enhance threat detection capabilities, allowing us to focus on strategic security initiatives.

World CyberCon META Edition: Transforming Threat Detection and Response

AI and ML are redefining the landscape of cybersecurity through various applications. Behavioral analytics, anomaly detection, and automated incident response are now integral to modern cybersecurity strategies. AI's ability to analyze vast datasets and identify patterns that elude traditional methods enables organizations to preemptively address potential threats. Irene Corpuz reinforced this notion, stating, "AI isn't a replacement, it's a force multiplier for cybersecurity. Leveraging AI and machine learning strengthens our defenses by automating threat detection, freeing us to focus on strategic security initiatives." [caption id="attachment_71219" align="aligncenter" width="1024"]World CyberCon META Edition (L-R: Sithembile (Nkosi) Songo – Chief Information Security Officer, ESKOM; Afra Mohammed Almansoori – Business Analyst, Digital Dubai; Dina Alsalamen, VP, Head of Cyber and Information Security Department, Bank ABC; Irene Corpuz – Co-Founder, Women in Cyber Security Middle East and Jo Mikleus – Senior Vice President, Cyble Inc.)[/caption]

Enhanced Accuracy and Speed

The panel discussed notable use cases where AI and ML have significantly enhanced the accuracy and speed of threat detection. In one instance, Bank ABC utilized AI-driven analytics to thwart a sophisticated phishing attack that traditional security measures failed to detect. By rapidly identifying and responding to anomalies, AI systems have proven to be a vital asset in the fight against cybercrime. However, the integration of AI and ML into cybersecurity is not without challenges. The panel emphasized the importance of adopting applicable policies and standards to mitigate risks associated with these technologies. Regulatory frameworks must evolve to address issues such as data privacy, ethical use of AI, and the potential for AI-generated threats.

Integration with Existing Infrastructure

Integrating AI and ML capabilities with existing security infrastructure is another critical consideration. Organizations must ensure seamless integration to maximize the benefits of AI without disrupting their current operations. This involves upgrading legacy systems, training staff on new technologies, and continually assessing the performance of AI tools. Best practices in reorienting strategic investments were also discussed. Companies are increasingly allocating resources towards AI capabilities to stay ahead of emerging threats. By investing in AI and ML, businesses can enhance their threat detection and response mechanisms, thereby safeguarding their digital assets more effectively.

Overcoming Implementation Challenges

The panel acknowledged the challenges and limitations of implementing AI and ML in cybersecurity, especially for small and medium-sized enterprises (SMEs). Resource constraints, lack of expertise, and integration issues are common hurdles. To overcome these challenges, organizations should consider collaborative approaches, such as partnering with cybersecurity firms and leveraging cloud-based AI solutions. A key theme was the envisioned collaboration between humans and machines in cybersecurity operations. AI and ML technologies can augment the capabilities of human analysts by handling routine activities, thus allowing experts to focus on more strategic tasks. This symbiotic relationship enhances overall security posture and operational efficiency. The reception from key stakeholders, including Boards, CEOs, and CFOs, was noted as increasingly positive. As cyber threats become more sophisticated, there is growing recognition of the need for enhanced cybersecurity measures. Business leaders are supporting CISOs in making the necessary investments to protect their organizations.

Delivering ROI

Finally, the panel discussed how to position business cases for AI in cybersecurity to deliver ROI. Demonstrating the tangible benefits of AI investments, such as reduced incident response times and minimized breach impact, is crucial for securing buy-in from stakeholders. [caption id="attachment_71215" align="aligncenter" width="1024"]World CyberCon META Edition Jo Mikleus, Senior Vice President at Cyble Inc.[/caption] Jo Mikleus summed up the session by stating, "It was a privilege to moderate the World CyberCon panel, discussing AI as a critical strategic investment for cybersecurity and managing threat intelligence."

The Middle East's Cybersecurity Imperative

As digitalization surges across the Middle East, the importance of strong cybersecurity measures cannot be overstated. The region's rapid technological advancement necessitates a proactive approach to combat the escalating cyber threat landscape. Leveraging AI and ML to complement traditional cybersecurity defenses is advantageous, but proactive measures are essential to mitigate AI-related risks. Shadow AI in the workplace is growing, with an alarming 156% increase in employees inputting sensitive corporate data into chatbots like ChatGPT and Gemini. The World CyberCon Meta Edition 2024 underlines the critical role of AI and ML in modern cybersecurity strategies. As cyber threats continue to evolve, strategic investments in these technologies will be pivotal in safeguarding the digital future.

The Guardian view on Starmer’s offer: the gap between Labour and the Tories should widen | Editorial

By: Editorial
27 May 2024 at 13:39

Small campaign pledges risk inhibiting Labour’s ability, if elected, to improve people’s lives

Sir Keir Starmer was asked on BBC Radio 4’s Today programme last Friday whether, if he achieved his goal for the UK to attain the highest sustained growth in the G7, he would readopt plans to scrap university tuition fees. He had committed to their abolition when running to be Labour leader in 2020, but dropped the policy last year because he said money was tight. Mishal Husain’s question exposed a contradiction in Sir Keir’s plans: the argument that he ditched his tuition-fee pledge to prioritise the NHS melted away if higher public spending could be financed by faster economic growth. Sir Keir parried, leaving the issue unresolved.

On Monday, Labour’s leader sought to further deflect from his rowback by leaving the door open to raising fees. Polling suggests that would be unpopular. Many voters might not want English university education to be free, but most want to see the cost reduced. Last year, Public First suggested that cutting fees to between £6,000 and £7,500 was the most popular option. Sir Keir was first elected to the Commons in 2015 on a Labour manifesto pledge to trim fees to such levels, with universities’ income made up through increased state support. But it would not be lost on him that even though his party had won the argument, Labour lost that election.

Continue reading...

💾

© Photograph: Stefan Rousseau/PA

💾

© Photograph: Stefan Rousseau/PA

The Guardian view on private equity and public services: this trend needs reversing | Editorial

By: Editorial
27 May 2024 at 13:39

From railways to nurseries and children’s homes, investors are taking advantage of chances to siphon taxpayer funds offshore

Sector by sector, private equity is making deep inroads into UK public services. More than a decade ago, the collapse of Southern Cross, the private-equity-owned care home operator, revealed the havoc that can be wreaked when essential public services are run by heavily indebted businesses with complex financial structures. Typically, such owners maximise profits by using low-tax jurisdictions, loans, and sale-and-leaseback arrangements that split holding companies from property assets.

Present trends show that this cautionary tale is being ignored. A forthcoming report from the Common Wealth thinktank uses the example of the companies that lease trains to railway operators, to demonstrate that private equity companies are pressing their advantage from financial engineering. Britain’s transport network has joined health and social care, children’s homes and some areas of education in offering rich pickings to private-equity investors.

Continue reading...

💾

© Photograph: Paul Hackett/Reuters

💾

© Photograph: Paul Hackett/Reuters

World Cybercon 3.0 META Awards Celebrate Champions of Cybersecurity in the Middle East

World Cybercon 3.0 META

The Cyber Express World CyberCon 3.0 META cybersecurity conference in Dubai was a standout event, showcasing significant achievements in cybersecurity with its prestigious META Awards. Hosted at Al Habtoor Palace, the awards ceremony gathered top talent from the cybersecurity sector, honoring individuals and organizations that have significantly enhanced cyber defenses across the META region. Among the esteemed awardees, Thomas Heuckeroth from Emirates Group and Dr. Hoda A. Alkhzaimi from EMaratsec were recognized as The Cyber Express Cybersecurity Persons of 2024 for their exceptional contributions. Here is the complete list of all other winners:

The Cyber Express Cybersecurity Person of 2024 (META): Man

[caption id="attachment_70293" align="aligncenter" width="2800"]World Cybercon 3.0 META (L-R: Beenu Arora, Co-Founder and CEO, Cyble Inc., Thomas Heuckeroth, SVP IT Infrastructure & Digital Platforms, Emirates Group and Jo Mikleus, Senior Vice President, Cyble Inc.)[/caption]

The Cyber Express Cybersecurity Person of 2024 (META): Woman

The Cyber Express Cybersecurity Diversity and Inclusion Advocates of 2024

The Cyber Express Awards Dina AlSalamen Rudy Shoushany, DxTalks

The Cyber Express Infosec Guardians of 2024 (BFSI)

Anthony Sweeney, Deribit

The Cyber Express Infosec Guardians of 2024 (Government & Critical Entities)

  • Talal AlBalas from Abu Dhabi Quality and Conformity Council (ADQCC)
The Cyber Express Awards
  • Abdulwahab Abdullah Algamhi, UAE ICP 
  • Vinoth Inbasekaran, Dubai Government Entity - Alpha Data 
  • Dr Hamad Khalifa Alnuaimi, Abu Dhabi Police 
  • Dr Saeed Almarri, Dubai Police 

The Cyber Express Top Cybersecurity Influencers of 2024

  • Dr. Mohammad Al Hassan, Abu Dhabi University
  • Maryam Eissa Alhammadi, Ministry of Interior
  • Hadi Anwar, CPX
  • Waqas Haider, HBL Microfinance Bank
  • Chenthil Kumar, Red Sea International
  • Nishu Mittal, Emirates NBD
  • Nisha Rani, Emirates Leisure Retail

The Cyber Express Top InfoSec Leaders 2024

The Cyber Express Top Infosec Entrepreneurs 2024

Insightful Discussions and Networking

The awards set a celebratory tone that carried through the rest of the conference. The day commenced with a vibrant atmosphere as attendees gathered for registration and explored the exhibition area, setting the stage for a day of insightful discussions and networking opportunities. Augustin Kurian, Editor-in-Chief of The Cyber Express, extended a warm welcome, emphasizing the importance of collaborative efforts in cultivating a secure cyber environment.

Keynote and Panel Sessions

Irene Corpuz, Co-Founder of Women in Cybersecurity Middle East, delivered the opening keynote, shedding light on the imperative of incubating security and nurturing a cyber-aware culture, particularly within startup ecosystems. Corpuz's address highlighted the significance of proactive measures in addressing cybersecurity challenges from the outset. Panel discussions served as focal points for in-depth exploration of key cybersecurity issues. From navigating cyber threats to leveraging innovative approaches for threat detection, industry experts provided valuable insights into emerging trends and strategic investments in cybersecurity. Notable panelists included Waqas Haider of HBL Microfinance Bank, Beenu Arora of Cyble, and Azhar Zahiruddin of Chalhoub Group, among others.

Diversity and Inclusion

The Cyber Express's World CyberCon Meta Edition event also celebrated diversity and inclusion in cybersecurity, honoring advocates who have championed these principles within their respective domains. Yana Li of WebBeds and Dina AlSalamen of Bank ABC were among the esteemed recipients of The Cyber Express Cybersecurity Diversity and Inclusion Advocates of 2024 award, acknowledging their efforts in fostering an inclusive cyber community. Strategic insights were further highlighted during panel discussions focusing on fortifying against ransomware and the role of AI and ML in enhancing threat detection. Expert moderators facilitated engaging conversations, addressing critical challenges and sharing best practices for prevention, mitigation, and swift recovery.

Conclusion

The Cyber Express World Cybercon 3.0 META Cybersecurity Conference successfully raised the bar for the collective dedication of cybersecurity professionals in the META region. By fostering dialogue, sharing insights, and recognizing excellence, the event played an important role in advancing cybersecurity resilience and shaping the future of cybersecurity across industries. The Cyber Express awards recognized the hard work and innovative solutions of the finest brains in cybersecurity, emphasizing the message that collaborative and proactive actions are critical to protecting our digital future. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Decoding the Primary Devils Behind Data Breaches

Data breaches

By Reuben Koh, Director, Security Strategy - Asia Pacific & Japan, Akamai Technologies  The cybersecurity landscape is rife with evolving threats, as highlighted by recent reports and surveys. External actors remain a predominant force, accounting for 83% of breaches, with stolen credentials being their weapon of choice in nearly half of these incidents. DNS attacks continue to plague organizations, causing app downtime of targeted entities, and web application attacks follow closely behind. Ransomware emerges as a formidable threat, dominating cybercrime with over 72% of attacks motivated by extortion. As cyber threats continue to escalate in sophistication and frequency, organizations must prioritize proactive security measures to safeguard their data, systems, and financial stability. Data breaches are a prevalent theme in today's headlines — posing significant risks to businesses, their customers, and partners. One of the first steps to safeguarding your organization’s sensitive data is understanding the primary causes of data breaches. Despite these risks, the adoption of robust security measures lags, with less than 1% of businesses currently employing a mature zero-trust model.

Critical weaknesses behind Data Breaches

Weak and stolen credentials

Although hacking attacks are frequently cited as the leading cause of data breaches, it's often the vulnerability of compromised or weak passwords or personal data that opportunistic hackers exploit. Statistics show that four out of five breaches are partially attributed to the use of weak or stolen passwords. To mitigate the risk of hackers executing an account takeover on sensitive accounts, businesses should consider deploying fraud protection tools. These act as proactive defenses, significantly reducing the likelihood of unauthorized access and enhancing the overall security of your accounts. Bot Managers also address challenges associated with bot traffic on websites and applications. It’s designed to identify, manage, and mitigate both malicious and non-malicious bot traffic, ensuring a more secure and efficient online experience. To further protect your organization, it’s also advisable to implement enterprise single sign-on (SSO), establish strong password hygiene, and set up phishing-resistant multi-factor authentication (MFA) across computer systems — this way, you can prevent personally identifiable information from getting into the wrong person’s hands.

Backdoor and application vulnerabilities

Exploiting backdoor and application vulnerabilities is a favored strategy among cybercriminals. When software applications are poorly written or network systems are inadequately designed, hackers will continuously probe for weaknesses to find open doors that grant them direct access to valuable data and confidential information. Ensuring your web application firewall (WAF) is regularly updated and well-managed helps mitigate these vulnerabilities. Due to constantly shifting attack techniques, organizations should also use advanced artificial intelligence (AI) powered security solutions to identify vulnerabilities and protect against unauthorized access. The WAF should be a robust security solution designed to protect web applications from a variety of cyber threats, including data breaches. It can serve as a barrier between web applications and the internet, scrutinizing and filtering HTTP traffic to identify and mitigate potential vulnerabilities and attacks.

Malware

The prevalence of both direct and indirect malware is increasing. Malware (inherently malicious software) is loaded onto a system by unsuspecting victims, providing hackers with opportunities to not only exploit the affected system but also potentially spread to other connected systems. This type of malware poses a significant security threat as it allows malicious insiders access to confidential information and provides the ability to steal data for financial gain. Implementing an advanced malware protection solution at multiple ingress points in the network can significantly enhance your security posture, reducing the risk that employees will fall victim to malicious software. By leveraging cutting-edge data security in malware detection and prevention, organizations can fortify their data protection defenses against evolving cyber threats and security breaches.

Social Engineering

Cybercriminals and hackers can shorten the effort of establishing unauthorized access by persuading individuals with legitimate data access to do it for them.  Phone calls, phishing scams, malicious links (often sent via email, text, or social media), and other forms of social engineering such as deep fakes are now commonly used to manipulate individuals into unwittingly granting access or divulging sensitive information like login credentials to cybercriminals. Such information can result in a data leak, in which hackers recycle, reuse, and trade-sensitive data like Social Security numbers or personal data for the purpose of identity theft and other illicit activities. Exercising vigilance in sharing sensitive information with external parties is quintessential. Awareness of the information being shared, and verification of legitimacy can serve as a simple yet effective defense against social engineering tactics.

Ransomware

Ransomware is a type of malicious software designed to restrict access to a computer system or files until a sum of money, or ransom, is paid. It typically encrypts the victim's files or locks their system, rendering it inaccessible, and then demands payment (often in cryptocurrency) in exchange for restoring access. Ensuring the safety and protection of your infrastructure against external threats is paramount. Organizations must be confident that attackers haven’t gained access to their systems and aren’t using them for malicious activities. Implementing a robust visibility and protection solution, such as microsegmentation will be helpful in this scenario. Microsegmentation offers a straightforward, fast, and intuitive approach to enforce Zero Trust principles within your network. This solution is designed to prevent lateral movement by visualizing activity in your IT environments, implementing precise microsegmentation policies, and swiftly detecting potential breaches.

Improper configuration and exposure via APIs

Misconfigured settings or parameters encompass various issues such as default passwords, open ports, or weak encryption. Such inadequacies can create vulnerabilities that hackers may exploit to gain unauthorized access to systems or data, leading to security breaches and other malicious activities. Inadequate configuration settings and vulnerabilities in APIs can expose them to a large number of security risks. Addressing and rectifying these issues is crucial to prevent unauthorized access and potential data breaches. Consider implementing proper API security and governance from code time to runtime, including regularly auditing API security measures, which are critical steps to enhance overall protection. To address misconfiguration and exposure via APIs, businesses must rely not just on their WAF but also on deploying an advanced API security solution to protect against evasive API abuses. This solution can offer comprehensive visibility, identifying vulnerabilities and detecting potential threats and abuses related to APIs. Moreover, it assists in helping organizations establish a more proactive approach to security by lowering the overall attack surface of critical APIs from secure development to runtime protection, effectively reinforcing their overall API security posture.

DNS attacks

Domain Name System (DNS) attacks are malicious activities that target the DNS infrastructure to disrupt or manipulate the resolution of domain names into IP addresses. These attacks can have various objectives, including causing service disruptions using distributed denial of service (DDoS), redirecting users to malicious websites, or gaining unauthorized access to sensitive information. Organisations must deploy a strong cloud-based authoritative DNS Service ensuring 100% availability and protection against multi-vector DNS attacks like flooding and water torture attacks. Implementing best practices and deploying security countermeasures that are able to withstand the attack volume, are crucial steps to take when mitigating these attacks.

Conclusion

Data breaches continue to pose a pervasive risk across various sectors, affecting organizations of all sizes and types — from healthcare and finance to e-commerce and retail. By proactively identifying potential vulnerabilities, organizations can reduce the likelihood of successful cyberattacks. Investing in robust security measures that enforce a Zero Trust Security model and ensuring their applications, APIs, and DNS services are continuously protected against cyber threats, helps mitigate financial risks associated with breaches, such as regulatory fines, legal fees, and revenue loss. By minimizing the impact of breaches, organizations can also maintain business continuity — and avoid disruptions to normal operations or damaged reputations. Overall, a comprehensive understanding of breach causes, and the implementation of appropriate security measures are vital for protecting data, minimizing risk, and ensuring the long-term success of all organizations. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.

The Guardian view on the Netherlands: a radical-right reset will challenge European unity | Editorial

By: Editorial
26 May 2024 at 12:30

Geert Wilders will see a fragile coalition deal as a chance to turn a core EU member state into a disruptive rebel

As tractor protests broke out last year over plans to slash nitrogen emissions in the Netherlands’ agricultural sector, one conspiracy theory suggested farmland was to be taken over to house asylum seekers. This was not true. But the rumours illustrated how easily anxieties over the green transition could be used to buttress a toxic and divisive political agenda. The opening was duly exploited by the veteran far‑right politician Geert Wilders, whose anti‑immigration Freedom party won most votes in last November’s election. Its platform included a pledge to leave the Paris agreement on climate change.

Thankfully, this commitment does not feature in the landmark coalition agreement Mr Wilders has just struck with three other conservative parties. Nor, after six months of tortured negotiations, do campaign promises to ban Islamic schools and mosques, and hold a referendum on leaving the EU. Reluctantly, Mr Wilders has also accepted that no coalition will be possible with him as prime minister, and the search for a viable candidate goes on. But the good news stops there.

Continue reading...

💾

© Photograph: John Beckmann/Orange Pictures/REX/Shutterstock

💾

© Photograph: John Beckmann/Orange Pictures/REX/Shutterstock

The Guardian view on discord in the arts world: a distraction from the real crisis

By: Editorial
26 May 2024 at 12:25

Scrapping over the way money is distributed is no answer to the problems created by a decade of underfunding

July’s election has sent Britain into a spin, but for Mary Archer, charged with reporting on the fitness for purpose of Arts Council England (ACE), it is particularly tricky. For that is the month when her report was expected to be delivered to ministers, in preparation for publication in the autumn.

All public bodies are rightly road-tested every few years to ensure that they are giving value for public money. But the remit for Dame Mary – a scientist and the wife of the former Tory party deputy chair Jeffrey Archer – is more than usually political. Arts funding has collapsed under the Conservatives, who have also pursued culture wars. Her report comes at a moment of profound dissonance, nearly halfway through Let’s Create, a 10-year ACE plan to spread the arts more widely, and 18 months into a funding term which attempted to put that plan into action while also complying with a government instruction to cut spending in London by £24m.

Continue reading...

💾

© Photograph: Equity/PA

💾

© Photograph: Equity/PA

This week on TCE Cyberwatch: Snapchat AI to political unrest in Kyrgyzstan

TCE Cyberwatch

This week on TCE Cyberwatch, we bring you news of new vulnerabilities that have cropped up, along with threats of cyberattacks and new cybercrime forums that have opened up.  With the U.S. elections around the corner, worries about cyberattacks have become more prevalent. There are also developments in the world of tech this week from other countries like Australia.  TCE Cyberwatch hopes all readers feel informed reading this article and realize the impact of cybercrimes. This recap aims to educate readers on the importance of staying vigilant in the current climate. We will also cover critical vulnerabilities, data breaches, and the evolving tactics of cybercriminals.

TCE Cyberwatch Weekly Update

Explore the newest updates and empower yourself with the information needed with TCE Cyberwatch. 

USDoD announces plans to resurrect BreachForum’s community 

The FBI's takedown of BreachForums, a key cybercrime marketplace, marked a significant victory against cybercrime. However, less than 24 hours later, the cybercriminal known as USDoD announced plans to resurrect the forum’s community.  BreachForums had been central for trading stolen data and hacking tools, and its removal was a major achievement, but USDoD and another administrator, ShinyHunters, claimed that they would revive the site. USDoD vowed to launch a new forum, Breach Nation, with domains breachnation.io and databreached.io, which is set to go live on July 4, 2024. Robust infrastructure, enhanced security, and upgraded memberships to the first 200,000 users were some of the things that were offered. Read More

Generative AI and its impact on the insurance industry 

Generative AI has become a major topic in AI discussions, especially with advanced models like OpenAI’s GPT-4 and Google’s Gemini 1.5 Pro. Bloomberg predicts that the Generative AI market will reach USD 1.3 trillion by 2032, holding potential across industries, but specifically insurance.   In insurance, Generative AI is expected to revolutionize operations, streamline claims by analyzing images and documents, speed up settlements and enhance customer satisfaction, improve decision-making, and reduce errors and cases of fraud through its data analysis capabilities.  Generative AI can also provide tailored recommendations and engage with customers in conversations. While Generative AI offers significant advantages, its adoption must address concerns about data privacy and ethical AI usage. Read More

Kyrgyzstan faces cyberattacks on government entities as mob violence occurs against foreign students 

Bishkek, the capital of Kyrgyzstan, is currently experiencing severe mob violence and cyberattacks. The turmoil began with a viral video showing a fight between Kyrgyz and Egyptian medical students, which led to widespread violence against foreign students. Simultaneously though, Kyrgyzstan is facing severe cyberattacks from various hacktivist groups.   The attackers, calling themselves Team Insane PK, have allegedly attacked multiple governmental platforms, including the Ministry of Agriculture and the Education Portal of the Ministry of Emergency Situations, as well as private entities like Saima Telecom and several universities. Additionally, Silent Cyber Force, another Pakistan-based group, has allegedly targeted Kyrgyzstan’s Ministry of Defence and Ministry of Agriculture. Read More

U.S. election causes worry surrounding several cyberattacks, specifically those of foreign interference 

With the 2024 U.S. elections approaching, foreign interference, particularly through cyberattacks, has intensified. Democratic Senator Mark Warner noted the involvement of both state and non-state actors, including hacktivists and cybercriminals, who find it increasingly easy to disrupt U.S. politics.  The Cybersecurity and Infrastructure Security Agency (CISA) is at the forefront of defending against these threats. CISA Director Jen Easterly emphasized that while election infrastructure is more secure than ever, the threat environment has become more complex, with foreign adversaries and generative AI capabilities posing significant risks. In response, CISA has ramped up its efforts, offering cybersecurity assessments, physical security evaluations, and training sessions to election stakeholders. Read More 

New Vulnerability Llama Drama spotted in Python package widely used by AI application developers 

A critical vulnerability, CVE-2024-34359, dubbed Llama Drama, was recently discovered in a Python package widely used by AI application developers. Discovered by researcher Patrick Peng, the vulnerability affects the llama_cpp_python package, which integrates AI models with Python and is related to the Jinja2 template rendering tool used for generating HTML.  Checkmarx, a cybersecurity firm, explained that the issue arises from llama_cpp_python using Jinja2 for processing model metadata without implementing proper security measures like sandboxing. This oversight enables template injection attacks, allowing for arbitrary code execution on systems using the affected package. More than 6,000 AI models that use llama_cpp_python and Jinja2 are impacted by this.  Read More

Europol investigating a black hat hacker who claims to have stolen classified data from their systems 

Europol is investigating a black hat hacker, IntelBroker, who claims to have stolen classified data from their system. The hacker allegedly accessed classified information, like employee data and source codes, from various branches of Europol, like the Europol Platform for Experts (EPE). IntelBroker posted screenshots as proof and later claimed to have sold the data.  Europol confirmed the incident and assured that no operational data was compromised. The agency has taken initial actions, and the EPE website is temporarily down for maintenance. Additionally, IntelBroker claimed to have hacked Zscaler, a cybersecurity firm, offering to sell access to their systems. Zscaler is investigating but has not found evidence of impact, other than a test environment exposed to the internet, though it's unclear if it was involved in the breach. Read More

Palo Alto Networks' forecast falls short of investor expectations  

Palo Alto Networks' fourth-quarter billings forecast fell short of investor expectations, signaling restrained corporate spending on cybersecurity amid economic uncertainty and persistent inflation. This caution has driven companies to diversify their cybersecurity investments to avoid reliance on a single vendor, leading to a reduced growth outlook for firms like Palo Alto Networks.   The company projected fourth-quarter billings between $3.43 billion and $3.48 billion, aligning closely with analysts' estimates but reflecting broader concerns about slowed growth in the sector. Analysts highlighted the lack of significant positive momentum in the revised forecasts put out by Palo Alto following this. However, the forecasts follow similar cautionary predictions from rivals like Fortinet, which hint at a broader trend of cautious spending in the cybersecurity industry. Read More

Australia passes its first legislation for a national digital ID 

Australia has passed its first legislation for a national digital ID, called myGovID, set to come into effect in November. This eliminates the need for multiple forms of physical ID. Lauren Perry from the UTS Human Technology Institute explains that the digital ID will streamline the cumbersome process of collecting and verifying multiple ID documents. The system acts as an intermediary between the user and organizations requiring identity verification.  Users will interact with organizations through an app, inputting a government-registered number to confirm their identity. Currently, the myGovID app serves this purpose, but private providers like MasterCard or Visa could join the system, enhancing security and reducing fraud risks. Read More

Western Sydney University faces a cybersecurity breach affecting 7,500 individuals. 

Western Sydney University faced a cybersecurity breach that affected around 7,500 individuals. The breach, first identified in January 2024, was traced back to May 2023 and involved unauthorized access to the university’s Microsoft Office 365 platform, including SharePoint files and email accounts., and their Solar Car Laboratory infrastructure.  WSU swiftly shut down its IT network and implemented security measures upon discovering the breach. The university has assured that no ransom demands have been made for the compromised information. The NSW Police and Information and Privacy Commission are helping to investigate the incident. The NSW Supreme Court has issued an injunction to prevent the unauthorized use of the compromised data, highlighting the legal implications of such breaches. Read More

ICO releases warning about data protection risks associated with generative AI for Snapchat 

The UK's Information Commissioner’s Office (ICO) has warned about the data protection risks associated with generative AI. The ICO found that the company that owned Snapchat, Snap, had not adequately assessed the data protection risks for its chatbot, which interacts with Snapchat’s 414 million daily users. The ICO issued a Preliminary Enforcement Notice to Snap-on October 6, highlighting a failure to properly evaluate privacy risks, especially for users aged 13 to 17.   This led to Snap undertaking a comprehensive risk assessment and implementing the necessary steps, which the ICO then deemed to fit data protection laws. Snapchat has integrated prevention of harmful responses from the chatbot and is working on additional tools to give parents more control over their children’s use of 'My AI'. The ICO will continue to monitor Snapchats generative AI developments and enforce compliance to protect public privacy rights. Read More

New malware named GhostEngine to exploit vulnerable drivers and install crypto mining software 

A novel malware campaign dubbed "REF4578" uses a malware called GhostEngine to disable endpoint detection and response (EDR) solutions and install crypto mining software. The malware exploits vulnerable drivers to terminate EDR agents, ensuring the persistence of the XMRig miner, which is used to mine Monero cryptocurrency without detection. The malware also installs a backdoor and includes an EDR agent controller and miner module to tamper with security tools and enable remote command execution via a PowerShell script.  Researchers at Antiy Labs, despite extensive analysis, were unable to identify specific targets or the threat actor behind the campaign. To detect GhostEngine, organizations should monitor for initial suspicious activities such as unusual PowerShell execution, execution from uncommon directories, privilege elevation, and vulnerable driver deployment. Key indicators include abnormal network traffic, DNS lookups pointing to mining pool domains, and specific behavior prevention events like unusual process execution and tampering with Windows Defender. Read More

Wrap Up

The ever-evolving landscape of cybersecurity requires constant vigilance. By staying informed about the latest threats and taking proactive measures, we can minimize the impact of cyberattacks and protect ourselves online.  As always, we can see that there is unrest present everywhere and cybercrimes play a huge role in that. TCE Cyberwatch is committed to keeping you informed about the latest developments in cybersecurity. Stay tuned for more in-depth analysis and actionable advice. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

The Observer view: When modified rice could save thousands of lives, it is wrong to oppose it

26 May 2024 at 01:30

The green movement’s attempts to block the cultivation of a grain enhanced with vitamin A is misguided

For a crop that was designed to save the lives of children, Golden Rice has had a disturbing, volatile history. Developed more than 20 years ago using the techniques of genetic manipulation, it provides consumers with the ability to make vitamin A, which is missing from many diets in developing countries. This is a deficit that can have grim consequences. Without vitamin A, infections among the young soar and it is estimated that the lives of more than 100,000 children are lost every year as a result.

The production of a food that could counter this deadly scourge might be expected to be greeted with global relief and gratitude. Sadly, this has not been the case. Although field trials of Golden Rice have shown it to be an effective source of vitamin A that is safe to grow and consume, the crop has yet to be grown commercially – thanks, in the main, to the green movement’s vociferous opposition to its cultivation. Led by Greenpeace, campaigners have attempted to block the growing of any genetically modified crop, regardless of any potential benefit it might possess, and Golden Rice has been a particular target for their attention. The organisation claims there are other more practical solutions to improve vitamin-A deficiency and accuses corporations of overhyping its efficacy to pave the way for approval of more profitable GM crops.

Continue reading...

💾

© Photograph: Erik de Castro/Reuters

💾

© Photograph: Erik de Castro/Reuters

The Observer view on the Tories: A chance to pass judgment on 14 years of misrule

25 May 2024 at 14:15

The Conservatives are a spent force with an appalling track record. They deserve a resounding general election defeat

As the Commons held its pre-election valedictory debate last Friday, two more senior Conservatives announced that they would be stepping down: the communities secretary, Michael Gove, and the former cabinet minister Dame Andrea Leadsom. They join 15 other current or former Tory cabinet ministers who are resigning seats, bringing the total number of Conservative MPs standing down to 78, higher than in 1997 when the party stood on the brink of a historic defeat.

This is just the latest indicator of the lack of confidence Conservative MPs have in their own party and its leadership; a party that deserves to be dealt a resounding defeat by voters in the polls on 4 July. Its 14 years in government constitute an appalling track record: the Tories have left Britain a poorer country blighted by rising inequality and falling social mobility; a less confident nation with declining influence on the global stage; and a much tougher place in which to lose your job or to fall sick. Their political choices have worsened the impact of the tough global headwinds of a pandemic and rising energy prices.

Do you have an opinion on the issues raised in this article? If you would like to submit a letter of up to 250 words to be considered for publication, email it to us at observer.letters@observer.co.uk

Continue reading...

💾

© Photograph: Henry Nicholls/AFP/Getty Images

💾

© Photograph: Henry Nicholls/AFP/Getty Images

Unlocking Tomorrow’s Data: Exploring the Future of Database Management

Database Management

By Shrikant Navelkar, Director, Clover Infotech  In today’s digital era, data holds immense significance. Database management traditionally was considered the domain of IT department alone, now it is emerging as a crucial element for business strategies. As we stand on the precipice of a new era defined by exponential data growth, let’s look at how new-age technologies such as cloud, blockchain, and AI are fundamentally reshaping the future of database management.   Here’s how these technologies are transforming database management and making them more beneficial to meet the ever-growing demands of a competitive business landscape.   Making database management more scalable and flexible – Cloud computing platforms provide unprecedented scalability and flexibility for database management. Enterprises can easily ramp up and scale down resources based on demand, avoiding the limitations of traditional on-premises infrastructure. This scalability enables businesses to cost-effectively manage growing volumes of data. Enhancing security and reliability of databases – Blockchain technology introduces decentralized and immutable ledgers, enhancing data security and integrity. By distributing data across a network of nodes, blockchain reduces the risk of single points of failure and unauthorized tampering. This decentralized approach ensures data transparency and trust, making it ideal for applications requiring secure and auditable transactions. Streamlining database for effective decision-making – Through advanced algorithms, AI revolutionizes database management by optimizing data storage, retrieval and analysis. AI-powered predictive analytics and anomaly detection algorithms can identify patterns and trends in large datasets, enabling businesses to anticipate future outcomes and make informed decisions swiftly. Further, it automates routine tasks such as data cleansing and indexing, reducing manual effort and allowing database administrators to focus on higher-value activities. Hence, AI-driven database management empowers organizations to leverage their data assets more effectively, facilitating quicker decision-making processes that drive competitive advantage. Enhancing the experience of database users – Technologies such as Natural language processing (NLP) enable users to interact with databases using conversational commands, thereby simplifying complex queries and speeding up data retrieval. Such intuitive interfaces and personalized interactions enhance the user experience. Additionally, cloud-based solutions provide seamless access to databases from any device or location, enhancing collaboration and productivity.

The Future Ahead: Challenges and Opportunities

Despite the transformative potential of these emerging trends, the future of database management is not without challenges. Concerns around data privacy, security, and regulatory compliance continue to loom large, necessitating robust governance frameworks and encryption standards. However, amidst these challenges lie immense opportunities for innovation and growth. The convergence of diverse technologies, from blockchain and AI to quantum computing, promises to usher in a new era of data management, characterized by agility, intelligence, and security. Organizations that embrace these advancements stand to gain a competitive edge in an increasingly data-driven world, unlocking new possibilities for innovation and value creation.  Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

10 Cybersecurity Tips for Safe Online Shopping

Safe Online Shopping

Online shopping has become a go-to method of purchasing for many people now, especially after lockdowns and easy accessibility to global stores. However, all the fun benefits of deals, discount codes, and door-step deliveries, mean a plethora of cybersecurity issues for safe online shopping.  Here is a list of ways that you can ensure you stay protected and secure when participating in safe online shopping. Some may be obvious, but are incredibly effective, nonetheless. Keep reading to find out how you can keep having fun shopping online while also reducing your vulnerability to attacks and hacks.  

10 Tips for Safe Online Shopping

1. Safe passwords 

Safe passwords Safe Online Shopping Ensuring that your password is unique and strong is essential. Refraining from using obvious words in relation to you like your name or personal information isn’t the way to go! Ensuring the use of multiple different types of characters such as (@#_$%!&), along with not using the same passwords regularly on different sites is recommended. Changing passwords on individual sites also helps as it allows for less easily guessed instances.  

2. Debit cards over credit cards 

debit cards over credit cards Safe Online Shopping It’s recommended that when it comes to safe online shopping, using payment gateways like PayPal, Venmo, or Stripe is better. Other than those, credit cards should be preferred over debit as debit cards are linked to your bank account whilst credit cards can be protected better. Debit cards create higher risk events of personal and sensitive data being obtained.  

3. Enable multi-factor authentication 

Enable multi-factor authentication Safe Online Shopping Multi-factor authentication is an added utility which means that there is another safety layer added before anyone can access your account after knowing your username or password.  Multi-factor authentication protects in 3 layers: first your passwords, or then something personal to only you like your fingerprint, or facial recognition. The 3rd way is through MFA apps, or getting a code sent through your messages or your email, to make sure you can do safe online shopping and the purchase you’re making is actually coming from you.

4. Check bank statements 

  This one is much simpler. Turning on automatic payment notifications to track every payment made will help you track when your money was spent and if it has gone somewhere genuine. If the charge seems fraudulent, you can then take the necessary steps to contact your bank and have them pause or shut your card so that further fraudulent purchases can be stopped.  

5. Wi-Fi: Make sure it’s at home or secure instead of publicly available 

Wi-Fi Safe Online Shopping When not using your own Wi-Fi, ensure you’re using secure, private networks for safe online shopping. Public Wi-Fi networks are much easier to access for scammers as poorly protected connections allow any information you find, very easily retrievable for them. This is especially dangerous if the public Wi-Fi network you’re using is at a mall while you try to access banking or payment sites for any purchases you will be making. 

6. Use secure websites 

use secure websites Online Shopping The key to safe online shopping is to use a secure website.  The padlock icon near the URL and the URL itself starting with HTTPS means you’re on the right track- The S in the end stands for secure. If that final S isn’t visible, it means that you’re dealing with a site that isn’t encrypted. Search engines like Google tend to flag sites that don’t have a valid Secure Sockets Layer (SSL) certificate as unsecure. It’s better to not input your payment details into sites like these. 

7. Be wary of emails 

Be wary of emails Safe Online Shopping Email scams known as phishing have become the most common forms of scamming nowadays. Your inbox may contain an email that may present you with deals, discounts, and sales through names and links which are close misspellings of popular websites. They are easy to fall for and may be hard to detect if the email somehow automatically fails to end up in your spam folder.  

8. Don’t buy from links that seem malicious/ don’t come from a trusted source 

malicious link Safe Online Shopping Other than e-mails, social media is also a place where links that can’t be trusted would be presented to you. Be wary of TikTok advertisements or ads shown between your Instagram stories which present you with deals and offers that seem too good to be true. Now, it becomes harder to tell with the use of deepfakes and AI to show the promotion of these scam products by influential people.  

9. Data backup 

Data backup Safe Online Shopping Ensuring that personal information and data are regularly backed up on your device or saved on the external hard disk is essential now due to ransomware attackers that can access your device and close off your access to important files or delete them entirely. Ensuring you have completed software updates is essential too as they help in ensuring fewer ransomware attacks and vulnerabilities on your devices to invasions.  

10. Protect your device/connect securely 

Protect your device Safe Online Shopping Some other ways to protect your device through your connection is: One, with a VPN, or two, by ensuring no details are saved on your browsers. VPN or Virtual Private Network encrypts your data and masks your IP addresses. This makes your identity, location, and browser activity hidden from potential attackers. Secondly, make sure that your device forgets your credit card details or password details. If these are remembered by your browsers, it makes these pieces of information immensely easy for attackers to obtain as they are all stored in one place when accessed by them.  While some of these may seem more easily achievable and accessible than others, they’re all a step in making sure your information is protected. We recommend regularly practicing all the above tips. These steps work even better together. So make sure to update your passwords and data backups, apply VPNs, stay wary of phishing emails, and practice safe online shopping. 

FAQs on Safe Online Shopping 

FAQs on Safe Online Shopping 

What is the most trusted safe online shopping site? 

Determining the most trusted online shopping site involves considering several key factors. Reputation is crucial, with established brands like Amazon and Flipkart often ranking high due to their track record of customer satisfaction.  Security is paramount, with HTTPS encryption and clear data privacy policies being essential indicators. Customer reviews on platforms like Trustpilot offer valuable insights into user experiences. Additionally, convenient payment options and positive personal experiences play a significant role in establishing trust.

Which online shopping practice is safest? 

For a safe online shopping experience, it's crucial to implement multiple security measures and exercise caution throughout the process. Begin by verifying the authenticity of the website and remain wary of deals that appear too good to be true. Stay vigilant against phishing scams and opt for credit cards over debit cards, as they typically offer better fraud protection. Ensure your passwords are strong and unique, and consider enabling multi-factor authentication for added security. Avoid using public Wi-Fi networks for shopping, and for an extra layer of protection, consider using a VPN. By following these steps, you can enhance your online safety and protect yourself against potential threats while shopping online.

What is a safe online shopping site?  

A safe online site uses HTTPS encryption, signified by a padlock symbol and "HTTPS" in the URL bar. It should also have a clear and concise privacy policy. 

What are fake shopping websites?  

Fake shopping websites are designed to look legitimate but steal your personal information or payment details. They often offer deals that seem too good to be true. 

Which websites can I trust?  

Amazon offers an extensive range of products with fast shipping. eBay, the largest online auction site, offers both new and used items, but it's essential to check seller reviews. AliExpress provides diverse products at budget-friendly prices, backed by seller ratings. Dealextreme offers competitive pricing, urging buyers to check reviews for confidence. In Fashion, Asos offers a wide range of clothing, footwear, and accessories for diverse preferences. Farfetch specializes in luxury fashion, featuring exclusive brands for discerning shoppers. Notino, a European-based online store, offers fragrances and cosmetics from popular brands at attractive prices. For Discounts, Cashback World provides benefits and discounts on purchases from partnered companies, online and offline, enabling savings across various products and services.

How to check a fake website?  

To discern the authenticity of a website, several key indicators can be examined. Firstly, verify the presence of HTTPS encryption and a valid SSL certificate. Next, scrutinize the website's content for any typos or grammatical errors, which can often signal a lack of professionalism.  Conduct thorough research into the company behind the website, looking for a physical address and phone number to ensure legitimacy. Additionally, reading online reviews caliasdasdn provide valuable insights into the experiences of previous customers. Finally, consider utilizing website safety checkers like F-Secure Online Shopping Checker for an extra layer of security and assurance. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

The Guardian view on Paula Vennells: pride came before her fall | Editorial

By: Editorial
24 May 2024 at 13:30

The Post Office boss’s self-serving behaviour was plain to see. But she was not the only one

Paula Vennells’s appearance at the Post Office Horizon IT inquiry was always going to be a big moment, even if it was overshadowed this week by Rishi Sunak’s decision to call an election. She was the chief executive of the government-owned business from 2012 to 2019, in charge when forensic accountants were hired to look into claims that subpostmasters had been wrongly blamed for errors caused by software – and when that investigation was terminated.

She was the boss when Alan Bates and more than 500 other subpostmasters won £58m in compensation. Since January, when ITV screened its remarkable Mr Bates vs The Post Office drama, Ms Vennells – who is also a vicar – has become the face of a scandal in which hundreds of people were wrongly prosecuted and 236 sent to prison.

Continue reading...

💾

© Photograph: Post Office Horizon IT Inquiry/PA

💾

© Photograph: Post Office Horizon IT Inquiry/PA

The Guardian view on prison overcrowding: a justice system in meltdown

By: Editorial
24 May 2024 at 13:25

Rishi Sunak’s government failed to protect the public, secure the prison estate and deliver swift access to justice

Prisons tend not to draw political attention except when they go wrong, and even then they have to go badly wrong. There are strong incentives for governments to neglect a service used by relatively few voters, and prisoners themselves can’t vote. But the prison system serves the wider community in various indirect ways. Locking criminals away protects the public. Conviction and punishment signal to society that justice is being done. Rehabilitation inside jails reduces reoffending. All of those functions are now breaking down, and the collapse is getting increasingly hard to ignore.

Last week it emerged that some prisoners serving short sentences will be eligible for release 70 days early, not because they have necessarily earned their freedom but because jails are full. This is the third such relaxation since October 2023 when the discount was 18 days, rising to 60 in March this year. Meanwhile, it has been reported that police forces in England and Wales have been advised to make fewer arrests because there are not enough available cells.

Continue reading...

💾

© Photograph: Andrew Aitchison/In Pictures/Getty Images

💾

© Photograph: Andrew Aitchison/In Pictures/Getty Images

The Guardian view on the end of a parliament: five years in which Britain’s leaders showed they were not up to the job | Editorial

By: Editorial
23 May 2024 at 14:14

Boris Johnson, Liz Truss and Rishi Sunak have all provided object lessons in how not to govern wisely or well

And so, at last and unlamented, the 2019 parliament will finally be laid to rest on Friday. This parliament’s prorogation is not shamelessly illegal, as Boris Johnson’s lawless attempt to end its predecessor was five years ago. But that is just about all that can be said in its favour. In almost every respect, this has been as shoddy and as discreditable a period as British government has had to endure. There can rarely have been a parliament that comes to its end as unmourned as this one.

Yet the 2019 parliament is dying as it lived, amid needless chaos and with political desperation once again taking precedence over legislative substance. Rishi Sunak’s gamble on a July election means that most of the government’s programme, which was announced in the king’s speech in November, will now never reach the statute book at all. This underscores a very troubling truth: that modern government is becoming more performative than effective, with MPs increasingly expected to campaign rather than to scrutinise or legislate.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: AP

💾

© Photograph: AP

The Guardian view on South Africa’s elections: a pivot point for the rainbow nation | Editorial

By: Editorial
23 May 2024 at 14:13

Cyril Ramaphosa promised a new dawn under his presidency, but support for the ruling African National Congress may fall below 50% for the first time

Thirty years after South Africans flocked to the country’s first free and fair elections, the country is at another pivot point. Polls suggest that in Wednesday’s general election, the ruling African National Congress (ANC) is likely to lose its majority for the first time, though its figures have improved somewhat in recent weeks. Despite some promising advances in the ANC’s first decade in power, the country’s political transformation with the end of apartheid was never adequately matched by economic and social change. GDP growth has averaged 0.8% annually since 2012.

A black middle class emerged, but income inequality is extraordinarily high. The top 0.1% hold 25% of the wealth, while the bottom 50% owe more than they own. Unemployment stands at more than 40% if those who have given up looking for jobs are included. The murder rate is one of the highest in the world. Education and the crumbling infrastructure are a source of national despair. Eskom, the state power company, has just said that it has “fixed” endemic blackouts. Others are sceptical. In 2022, more than four in five adults surveyed said the country was going in the wrong direction.

Continue reading...

💾

© Photograph: Siphiwe Sibeko/Reuters

💾

© Photograph: Siphiwe Sibeko/Reuters

The Guardian view on the general election: countdown to a reckoning that is overdue | Editorial

By: Editorial
22 May 2024 at 13:47

The prime minister has run out of road and is left defending a thin legacy against the prospect of regime change

When Britain last held a general election, the country was still a member of the European Union, there had been no pandemic and the Conservatives had already been in power for nearly a decade. That now feels like a long time ago, but not because of any sense of progress or accomplishments by the government. Quite the opposite.

Fear of taking punishment for years of accumulated disappointment is the reason why Rishi Sunak has postponed the dissolution of parliament until now. The prime minister’s decision to set a date – the election will be on 4 July – is driven not by confidence in a record to celebrate, but by a recognition that procrastination had become untenable. The Conservative party, exhausted and riven by factional feuding, has become ungovernable, leaving the country feeling ungoverned.

Continue reading...

💾

© Photograph: Stefan Rousseau/PA

💾

© Photograph: Stefan Rousseau/PA

The Guardian view on free trade: an idea whose time has gone | Editorial

By: Editorial
22 May 2024 at 13:45

Joe Biden and Donald Trump agree on tariffs against China. The world has lost its biggest cheerleader for globalisation

The biggest shift in American politics has nothing to do with Stormy Daniels or Michael Cohen, Fox News or golf courses. Indeed, its author is not Donald J Trump. Yet the implications stretch far beyond this year’s presidential elections, and affect countries across the world. The era of free trade is dying, and the man bringing down the guillotine represents the party that in the past three decades has been evangelically pro-globalisation: the Democrats.

Last week, Joe Biden imposed tariffs on a range of Chinese-made goods. Electric cars produced in China will now be hit with import tax of 100%, chips and solar cells 50% and lithium-ion batteries 25%. These and other tariffs on goods worth an estimated $18bn a year amount to a rounding error in the giant US economy. And in an election year, Mr Biden, who hails from Scranton, Pennsylvania, is fretting about support not only in his home state but across the country’s industrial heartland, gutted by decades of free trade.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Bonnie Cash/UPI/REX/Shutterstock

💾

© Photograph: Bonnie Cash/UPI/REX/Shutterstock

The Guardian view on the ICC: undermining this court undermines international standards | Editorial

By: Editorial
21 May 2024 at 14:37

The US and others have criticised the chief prosecutor for seeking arrest warrants for Israeli leaders. The ICC needs support

The international criminal court was born more than two decades ago, largely from the genocides of Rwanda and Yugoslavia, and the contradictory impulses that they inspired: the grim recognition of the worst of human nature and the optimistic determination to address it. More than 120 countries ratified its founding treaty. But the world’s superpower – and other major players including Russia, China and India – refused.

The result, almost inevitably, was that it became regarded – in the reported words of one elected official to the chief prosecutor, Karim Khan – as “built for Africa and thugs like Putin”. In fact, Vladimir Putin’s indictment a year ago, applauded by the US and others, was regarded as a gear change for a body that had overwhelmingly charged African leaders and officials.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Luis Acosta/AFP/Getty Images

💾

© Photograph: Luis Acosta/AFP/Getty Images

The Guardian view on peaceful protests: the high court has preserved a fundamental right | Editorial

By: Editorial
21 May 2024 at 14:37

Ministers should think again after judges ruled the authoritarian move to constrain demonstrations was unlawful

Judges in the high court have found that the former home secretary Suella Braverman acted unlawfully in making it easier for the police to criminalise peaceful protest. That is a very good thing for society and democracy. The rights of non-violent assembly are among our fundamental freedoms, providing a touchstone to distinguish between a free society and a totalitarian one. Liberty, the civil rights campaigners who took the government to court, ought to be congratulated for standing up for all our rights. At the heart of this case was whether a minister could, without primary legislation, decide what words meant in law. The court, thankfully, thought that such matters were best left to the dictionary.

During protests by environmental groups in the summer of 2023, Ms Braverman had decided to rule by diktat. Consulting only the police, and not the protesters who would have been affected, she used so-called Henry VIII powers that the government had conferred upon itself a year earlier. These allowed her to lower the threshold at which the police would intervene to impose conditions on public protest, defining “serious disruption” as anything “more than minor”. There’s an ocean of difference between the two. But Ms Braverman was unconcerned that she was shamefully pursuing a nakedly authoritarian move to constrain the right of peaceful protest by stripping words of their meaning.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Carl Court/Getty Images

💾

© Photograph: Carl Court/Getty Images

The Guardian view on the infected blood report: the disaster’s victims have at last been heard | Editorial

By: Editorial
20 May 2024 at 13:50

The grave failures of politicians, civil servants and the NHS over decades must lead to change

Nothing can bring back the 3,000 or so people who died as a result of contaminated blood products given to them by the NHS from the 1970s to the early 1990s. Thousands of others continue to struggle with viruses acquired in the same way, while others live with the knowledge that loved ones, including children, died or were infected needlessly. The report of the infected blood inquiry, published on Monday, has been far too long in coming. Victims of this disgraceful episode were fobbed off for decades, before the then prime minister Theresa May agreed to a public inquiry in 2017.

That decision was taken under strong pressure from campaigners. Andy Evans, who was infected with hepatitis C and HIV as a child, has described the official response as “kicking and screaming” all the way. The statement by the inquiry’s chair, Sir Brian Langstaff, on Monday was greeted with a standing ovation. But campaigners’ relief is mingled with anger and sadness. Truth, justice and accountability should not have been delayed for so long.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Benjamin Cremel/AFP/Getty Images

💾

© Photograph: Benjamin Cremel/AFP/Getty Images

The Guardian view on Julian Assange: time to dial this process down | Editorial

By: Editorial
20 May 2024 at 13:50

The high court decision to allow an appeal against extradition is good news. But a political resolution to this saga needs to be sought

Given the real possibility of his extradition within days to face espionage charges in the United States, Monday’s high court decision granting Julian Assange leave to appeal was a last-ditch victory for good sense. Mr Assange and his lawyers now have some months of breathing space, during which the search for a political resolution to his case can continue. Fourteen years into this protracted saga, that would be by far the most desirable outcome.

Handing Mr Assange a legal lifeline, the high court rightly judged US assurances that Mr Assange could “seek” to rely in court on first amendment protections to be less than a guarantee. Its decision, though related to Mr Assange’s status as a non-US national, underlined the broader risks of pursuing a trial on the basis of charges put together by Donald Trump’s justice department in 2019.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Anadolu/Getty Images

💾

© Photograph: Anadolu/Getty Images

The Guardian view on net zero: a bank-led green transition won’t work for Britain | Editorial

By: Editorial
19 May 2024 at 12:30

A state industrial strategy is needed to reduce carbon output, produce cleaner growth and redistribute jobs around the UK

Theresa May and Boris Johnson both argued for levelling up and for a state-supported green transition undergirded by an industrial strategy. Neither delivered and their successor, Rishi Sunak, has repudiated their legacy as prime minister. He looks to the City to deliver growth, with banks determining the rate of investment to meet the challenge of the climate emergency. This is a recipe for failure. The Climate Change Committee (CCC), the government’s independent advisers on cutting carbon emissions, warned last year of “worryingly slow” progress to meet net zero targets. The government is not engaging on what it will take to decarbonise.

Weaning the country off fossil fuels and on to green energy is a complex transition that should be a job for the state, not the free market. Yet Britain is bottom of the league for state spending on renewables in the Organisation for Economic Co-operation and Development. In the offshore industry alone 30,000 workers could end up with nowhere to go by 2030 without new roles in green industries. Relying on big finance to meet that gap will entrench today’s failing model, which emphasises the need to attract significant capital flows through deregulation and privatisation, strengthening the hand of boom-and-bust financial services and weakening labour rights. The flipside is a bigger trade deficit and a destructive politics of redistribution to asset holders and to London.

Continue reading...

💾

© Photograph: Danny Lawson/PA

💾

© Photograph: Danny Lawson/PA

The Guardian view on phones in concert halls: what engages some enrages others | Editorial

By: Editorial
19 May 2024 at 12:25

While some feel that allowing live performances to be photographed or filmed adds to the buzz, others hate it

Since an outbreak last year of rowdyism in musical theatre, the question of how audiences should behave during live performances has been burrowing its way into the heart of the cultural establishment. It has now popped its head up in the classical music world, where it is not about sprayed beer and dancing in the aisles, but phone etiquette at concerts.

The debate was sparked when the tenor Ian Bostridge halted a recital in Birmingham because he was being distracted by people recording him. He later discovered that he was out of line with policy at the Symphony Hall, home to the City of Birmingham Symphony Orchestra (CBSO), which welcomed its audiences to take photographs and short video clips. The resulting set-to, with supporters deluging the orchestra with complaints about the policy, and its management promising to clarify and refine but not withdraw it, casts an interesting light on efforts to build new audiences in a sector that has been struggling to find its way in a straitened economy at a time of rapidly changing habits.

Continue reading...

💾

© Photograph: Phil Broom/Alamy

💾

© Photograph: Phil Broom/Alamy

Generative AI’s Game-Changing Impact on InsurTech

Generative AI

By Sachin Panicker, Chief AI Officer, Fulcrum Digital  Over the past year, Generative AI has gained prominence in discussions around Artificial Intelligence due to the emergence of advanced large multimodal models such as OpenAI's GPT-4, Google’s Gemini 1.5 Pro etc. Across verticals, organizations have been actively exploring Generative AI applications for their business functions. The excitement around the technology, and its vast untapped potential, is reflected in a prediction by Bloomberg that the Generative AI will become a USD 1.3 trillion market by 2032. Insurance is one of the key sectors where Generative AI is expected to have a revolutionary impact – enhancing operational efficiency and service delivery and elevating customer experience. From automating claims processing to predictive risk assessments, let us take a deeper look at some of the Generative AI use cases that will redefine InsurTech in the years ahead.

Automated and Efficient Claims Settlement

Lengthy and complex claims settlement processes have long been a pain point for insurance customers. Generative AI addresses this by streamlining the claims process through seamless automation. AI analyzes images or other visual data to generate damage assessments. It can extract and analyze relevant information from documents such as invoices, medical records, and insurance policies – enabling it to swiftly determine the validity of the claim, as well as the coverage, and expedite the settlement. This serves to improve process efficiency, reduce the administrative burden on staff, and significantly boost customer satisfaction.

Optimized Underwriting and Streamlining Risk Assessment

Underwriting is another key area where this technology can create immense value for insurance firms. With their ability to analyze vast amounts of data, Generative AI models build comprehensive risk assessment frameworks that enable them to swiftly identify patterns and highlight potential risks. It automates evaluation of a policy applicant’s data, including medical and financial records submitted, in order to determine the appropriate coverage and premium. Leveraging AI, underwriters are empowered to better assess risks and make more informed decisions. By reducing manual effort, minimizing the possibility of human error, and ensuring both accuracy and consistency in risk assessment, Generative AI is poised to play a pivotal role in optimizing underwriting processes.

Empowering Predictive Risk Assessment

Generative AI’s ability to process and analyze complex data is immensely valuable in terms of building capabilities for predictive risk assessment. Analyzing real-time and historical data, and identifying emerging patterns and trends, the technology enables insurers to develop more sophisticated models of risk assessment that factor in a wide range of parameters – past consumer behavior, economic indicators, and weather patterns, to name a few. These models allow insurers to assess the probability of specific claims, for instance, those related to property damage, or automobile accidents. Moreover, the predictive capabilities of Generative AI help insurers offer more tailored coverage and align their pricing strategies with a dynamic environment. The ongoing risk monitoring and early detection of potential issues that the technology facilitates can also prove highly effective when it comes to fraud prevention. Through continuous analysis of data streams, AI identifies subtle changes and anomalous patterns that might be indicative of fraudulent activity. This empowers insurers to take proactive measures to identify possible fraudsters, prevent fraud, and mitigate potential losses. The robust predictive risk assessment capabilities offered by Generative AI thus serve to strengthen insurer’s business models, secure their services against fraud and other risks, and enhance customer trust and confidence in the coverage provided.

Unlocking Personalized Customer Service

In a digitally driven world, personalization has emerged as a powerful tool to effectively engage customers and elevate their overall experience. By analyzing vast amounts of consumer data, including interactions across the insurer’s digital touchpoints, Generative AI gains insights into consumer behavior and preferences, which in turn enables it to personalize future customer service interactions. For instance, by analyzing customer profiles, historical data, and various other factors, AI can make personalized policy recommendations, tailored to an individual customer’s specific needs, circumstances, and risk profile. Simulating human-like conversation with near-perfection, Generative AI can also engage with customers across an insurer’s support channels, resolving queries and providing guidance or making recommendations based on their requirements. The personal touch that Generative AI brings to customer engagement, as compared to other more impersonal digital interfaces, coupled with the valuable tailored insights and offerings they provide, will go a long way towards helping insurers build long-term relationships with policyholders.

Charting a Responsible Course with Generative AI in Insurance

The outlook for Generative AI across sectors looks bright, and insurance is no exception to the trend. Insurance firms that embrace the technology, and effectively integrate it into their operations, will certainly gain a significant competitive advantage through providing innovative solutions, streamlining processes, and maximizing customer satisfaction. This optimism however must be tempered with an acknowledgment of concerns by industry stakeholders, and the public at large, around data privacy and the ethics of AI-driven decision-making. Given that insurance is a sector heavily reliant on sustained consumer trust, it is essential for leaders to address these concerns and chart a course towards responsible AI adoption, in order to truly reap the benefits of the technology and usher in a bold new era of InsurTech. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

RATs Control: Combating The Menace of Remote Access Trojans

RATs Control: Combating The Menace of Remote Access Trojans

By Riyaz Tambe, Senior Director, Sales Engineering, India, Zscaler In today’s landscape, saying that cyberattacks are rising exponentially in number and sophistication is like saying that the earth revolves around the sun. While this is an obvious statement, it is still the reality that most IT security teams have to contend with day-in, day-out. According to ThreatLabz State of Encrypted Attacks 2023 report, APAC alone saw a 46 percent rise in encrypted attack hits – with India observing 27 percent increase from the previous year.    While ransomware and malwares often grab headlines, Remote Access Trojans (RATs) have been quietly lurking in the background, proving to be a significant threat to organizations globally and in India. In contrast to ransomware, which primarily aims for financial gains by encrypting systems and extorting a ransom, RATs grant attackers full authority over compromised devices. This grants them access to retrieve sensitive data like user credentials, passwords, and financial information.   Additionally, these malicious tools empower attackers to monitor online activities, collect browsing histories, intercept emails and chat records, and even commandeer webcams for invasive surveillance. This covert infiltration poses a substantial risk to individuals, organizations, and national security, necessitating urgent attention. 

Releasing Remote Access Trojans (RATs) into the Wild 

Remote Access Trojans or RAT attacks often involve the deception of users through the distribution of malicious software disguised as legitimate applications. A recent example of this tactic was observed by ThreatLabz in December 2023. In this case, threat actors created fraudulent websites that mimicked well-known video conferencing platforms like Skype, Google Meet, and Zoom, aiming to distribute Remote Access Trojans to unsuspecting users. These websites, hosted on the same IP address and designed in Russian, were specifically crafted to trick users into downloading malicious files.  The attackers constructed fake websites that closely resembled legitimate platforms, complete with URLs that closely resembled authentic meeting links. When users visited these fraudulent sites, they were prompted to download files, such as APKs for Android or BATs for Windows. Once these files were downloaded or opened, they initiated the installation of malicious files disguised as legitimate applications, thereby setting up Remote Access Trojan software.  By utilizing these RATs, attackers gain complete control over compromised devices, enabling them to access sensitive information, monitor activities, and potentially engage in malicious actions such as data theft and keystroke logging.  India has been a prime target for RAT campaigns, with instances like the notorious APT36 group, which specifically targets individuals associated with military or political affiliations in India and Pakistan, utilizing RATs extensively. Another notable example is CapraRAT, a modified version of the open-source RAT called AndroRAT. This malware possesses various data exfiltration capabilities, enabling it to gather sensitive information such as the victims' locations, phone call history, and contact details. 

Pest Control: Getting Rid of Remote Access Trojans (RATs) 

With the adoption of hybrid work models in India, the increased reliance on online meeting platforms has created an ideal environment for cybercriminals utilizing Remote Access Trojans. It is crucial to comprehend the nature of these malicious tools, as they provide attackers with unfettered control over compromised devices, facilitating the theft of sensitive data such as credentials, financial information, and the ability to monitor online activities.  As the reliance on online meeting platforms in India is increasing, here are some steps individuals and organizations can take to stay safe: 
  • Promoting security awareness and training: Organizations should prioritize conducting cybersecurity awareness programs to educate employees and users on the risks associated with downloading unfamiliar applications or files. This includes raising awareness about the dangers of phishing scams and social engineering tactics. 
  • Adopting the Zero Trust security model: Embracing the Zero Trust model can strengthen an organization's resilience against RAT attacks. This approach emphasizes identity verification, reduces the attack surface, and enhances incident response capabilities. 
  • Implementing network security measures: Deploying robust network security measures, such as endpoint protection and web filtering, can effectively detect and block malicious activities. 
  • Developing incident response plans: Organizations should establish comprehensive incident response plans to promptly address and mitigate the impact of potential security incidents. 
  • Maintaining software updates: Regularly updating operating systems, applications, and security software is crucial to address vulnerabilities and patch security holes. 
By comprehending the risks associated with Remote Access Trojans and implementing a multi-layered approach that incorporates technical safeguards, individuals and organizations can bolster their cybersecurity defenses. This is essential in protecting digital assets, organizational interests, and national security from significant breaches.  In conclusion, maintaining vigilance and exercising caution while online, particularly when encountering unfamiliar websites or download prompts, is of utmost importance. Always verify the URL before clicking on any download buttons and refrain from downloading software from untrusted sources. These practices can help safeguard against falling victim to RAT attacks.  Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

The Observer view: it’s up to Israel’s allies to persuade Netanyahu to stop standing in the way of peace

19 May 2024 at 01:30

Even his defence minister knows that there can be no military solution to the war with Hamas

The emotional vow by Benjamin Netanyahu, Israel’s prime minister, to “destroy” Hamas after it massacred about 1,200 people on 7 October 2023 was understandable. But in practice it was never a realisable aim. Eight months into the ensuing conflict, more than 35,000 Palestinians are dead, yet Hamas is still fighting in parts of Gaza that Israel’s army thought it controlled, a new humanitarian crisis looms around Rafah, 640,000 people have been displaced again, and the agony of Israeli hostages and their families is daily renewed. Three more bodies were recovered on Friday.

Defeating Hamas remains a vital objective for Israel and most western and Arab governments, as well as ordinary people appalled by its actions. But, from the very first, Netanyahu has failed, or rather refused, to articulate a “day after” strategy for administering (and rebuilding) Gaza once its terrorist rulers are supposedly “destroyed”. Despite the evidence, he refuses to accept that military force alone will not work. Hamas’s defeat, if it is to be permanent, must be political, legal, economic and psychological as much as physical.

Continue reading...

💾

© Photograph: Anadolu/Getty Images

💾

© Photograph: Anadolu/Getty Images

The Observer view on child poverty: Labour must tackle this scourge as soon as possible | Observer editorial

18 May 2024 at 13:00

Growing up in a poor household is one of the biggest barriers to opportunity, yet it affects millions of children

Gordon Brown on the UK’s child poverty scandal
Torsten Bell: We can easily end child poverty
Archbishop urges Starmer to ditch ‘cruel’ benefit cap

Almost one in three British children now live in relative poverty. Former prime minister Gordon Brown last week referred to this generation as “austerity’s children”: children who have known nothing but what it is to grow up in families where money concerns are a constant toxic stress, where a lack of a financial cushion means one adverse event can trigger a downward debt spiral, and where parents have to make tough choices about essentials such as food and heating. Rising rates of child poverty are a product of political choices; that we have a government that has enabled them is a stain on our national conscience.

The headline rate of child poverty is underpinned by other alarming trends. Two-thirds of children living in relative poverty, defined as 60% of median income, after housing costs, are in families where at least one adult works, a product of the number of low-paid jobs in the economy that do not allow parents to adequately provide for their children. Unsurprisingly, child poverty rates are higher in families where someone has a disability, and 58% of children from Pakistani and 67% of Bangladeshi backgrounds live in relative child poverty. Child homelessness is at record levels – more than 140,000 children in England are homeless, many living for years on end in temporary accommodation that does not meet the most basic of standards. One in six children live in families experiencing food insecurity, and one in 40 in a family that has had to access a food bank in the past 30 days.

Continue reading...

💾

© Photograph: Andrew Fox/Alamy

💾

© Photograph: Andrew Fox/Alamy

Data Virtualization: Optimising Access and Utilisation in Enterprise AI Systems

Data Virtualization

By Puneet Gupta, Vice President and Managing Director, NetApp India/SAARC Propelled by the evolving trends in data, data virtualization is emerging as a new-age avenue, revolutionizing the way businesses leverage their data assets. The global market for this disruptive technology is poised to take a steep growth curve, with projections estimating a value of USD 12878.39 million by 2028, with a whopping CAGR of 24.88% during 2022–2028. This underscores the immense significance of data virtualization, particularly for India, where it presents a promising opportunity to maximize the efficiency of enterprise AI ecosystems. As outlined by NetApp’s 2024 Cloud Complexity report, 70% of surveyed companies in India already have AI projects up and running or in motion, which is commendably higher than the global average of 49%. Given this increasing readiness to adopt AI models and projects, data virtualization could be the ticket for Indian industries to optimize operations, making them more flexible and scalable than ever before. Essentially, this technology offers the abstraction of data from its physical confines, facilitating seamless access and utilization across the enterprise. Legacy IT infrastructure often grapples with the demands of modern-day business operations. The significance of this advancement lies in its ability to transcend the constraints of conventional data management approaches, offering agility, scalability, and efficiency in managing extensive and diverse datasets. Within AI ecosystems, it proves to be crucial in optimizing access to critical data and expediting the development and deployment of AI-driven solutions.

Advantages of Data Virtualization

In today's hyper-competitive business landscape, rapid modernization is the key to staying ahead of the curve. Virtualization empowers corporations to unlock a wealth of new opportunities and drive competitiveness through enhanced decision-making and accelerated time-to-market. By furnishing real-time access to actionable insights, it equips businesses to make informed decisions and capitalize on budding trends and emergent opportunities. Among the many advantages that data virtualization offers, a significant one is its ability to optimize resource utilization. By consolidating virtual environments, organizations can realize considerable cost savings whilst simultaneously enhancing operational efficiency. This not only mitigates the complexity of IT infrastructure but also augments scalability, enabling businesses to swiftly adapt to changing demands and market dynamics. In the world of enterprise AI, agility is crucial. By facilitating rapid deployment of such solutions, it allows businesses to capitalize on emerging opportunities and respond swiftly to evolving customer needs. Its inherent flexibility enables businesses to adapt their AI strategies in real-time, ensuring maximum impact and value creation. Centralized management and monitoring capabilities are also essential for effective data governance and control. Simplifying IT operations by providing a unified platform for managing and monitoring data assets is yet another benefit observed. This streamlined approach not only reduces administrative overhead but also enhances visibility and compliance, ensuring data integrity and security across the corporation. Access to timely and accurate data is the lifeblood of AI-driven decision-making. Through this innovation, access to critical data can be accelerated, enabling organizations to derive actionable insights with unmatched speed and accuracy. By breaking down data silos and facilitating seamless integration, it empowers businesses to make informed decisions that drive growth and improvement. It is well-founded that digital transformation thrives on experimentation and iteration. Data virtualization fosters a culture of innovation within AI ecosystems by providing a platform for rapid prototyping and testing. Its flexible architecture enables data scientists and AI developers to explore new ideas and concepts, leading to the development of ground-breaking solutions that drive business value and competitive advantage.

The Future of Data

As we embrace the future facilitated by the adoption of enterprise AI, the strategic importance of data virtualization cannot be overstated. By leveraging this technology, businesses can streamline operations, drive efficiency, and unlock new opportunities for growth and competitiveness. Looking ahead, the evolving role of this innovation will continue to shape the future of AI, providing companies with the tools they need to stay ahead of the curve and thrive in the digital age. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

TCE Cyberwatch: This Week’s Cybersecurity Rundown

TCE Cyberwatch

This week on TCE Cyberwatch, we delve into the recent hackings of major organizations, including the International Baccalaureate, Boeing, and BetterHelp, which have sparked widespread concern online. We also highlight ongoing developments in enhancing cybersecurity measures.

National governments are also grappling with cybersecurity challenges. TCE Cyberwatch examines how these issues have affected countries and the proactive steps organizations are taking to stay ahead in the evolving landscape of cybersecurity. Keep reading for the latest updates.

TCE Cyberwatch: A Weekly Round-Up

IB Denies Exam Leak Rumors, Points to Student Sharing

The International Baccalaureate Organization (IBO) faced allegations of exam paper leaks, but it denied any involvement in a cheating scandal. Instead, the organization acknowledged experiencing a hacking incident, unrelated to the current exam papers circulating online.

The breach was attributed to students sharing exam materials on social media platforms. Concurrently, the IBO detected malicious activity within its computer networks.

The act of students sharing exam content online is commonly known as "time zone cheating," wherein students who have already completed their exams disclose details about the questions before others take the test. Additionally, the malicious activity targeted data from 2018, including employee names, positions, and emails. Screenshots of this leaked information surfaced online. Read More
Boeing Hit by $200 Million Ransomware Attack, Data Leaked
The aeronautical and defense corporation, Boeing, recently confirmed that it had been targeted by the LockBit ransomware gang in October 2023. They also acknowledged receiving a $200 million demand from the attackers to prevent the publication of leaked data. On November 10, approximately 40GB of data was leaked by LockBit, though Boeing has not yet addressed the situation. The ransomware group initially identified Dmitry Yuryevich Khoroshev as the principal administrator and developer behind the LockBit ransomware operation. However, this claim has since been denied by the actual developer. Additionally, Boeing has not announced whether it paid the $200 million extortion demand. Read More
Lenovo Pledges Stronger Cybersecurity with "Secure by Design" Initiative
Lenovo recently joined the Secure by Design pledge initiated by the US Cybersecurity and Infrastructure Security Agency (CISA) to enhance its cybersecurity measures. This announcement was made on May 8th, and the initiative covers various areas including multi-factor authentication and vulnerability reduction. Doug Fisher, Lenovo’s Chief Security Officer, emphasized the importance of industry collaboration in driving meaningful progress and accountability in security. "It’s good for the industry that global technology leaders are able to share best practices," he stated. Many other tech companies have also joined this effort to ensure their security. Read More UK’s AI Safety Institute releases public platform which furthers safety testing on AI models. UK’s AI Safety Institute has recently made its AI testing and evaluation platform available publicly. Inspect, the platform that aims to start more safety tests surrounding AI and ensuring secure models. It works by assessing capabilities of models and then producing a score. It is available to AI enthusiasts, start-up businesses and international governments, as it is released through an open-source licence. Ian Hogarth, the Chair of the AI Safety Institute, has stated that, “We have been inspired by some of the leading open-source AI developers - most notably projects like GPT-NeoX, OLMo or Pythia which all have publicly available training data and OSI-licensed training and evaluation code, model weights, and partially trained checkpoints.” Inspect works by evaluating models in areas such as their autonomous abilities, abilities to reason, and overall core knowledge. Read More 
NASA Names First Chief Artificial Intelligence Officer

NASA announced its first Chief Artificial Intelligence (AI) Officer. David Salvagnini, who previously served as the Chief Data Officer, has now expanded his role to incorporate AI. His responsibilities included developing strategic vision and planning NASA's AI usage in research projects, data analysis, and system development.

NASA Administrator Bill Nelson stated, “Artificial intelligence has been safely used at NASA for decades, and as this technology expanded, it accelerated the pace of discovery.” Salvagnini also worked alongside government agencies, academic institutions, and others in the field to ensure they remained up to date with the AI revolution. Read More. Read More 
DDoS Attacks Target Australia Amidst Ukraine Support

The Cyber Army Russia Reborn launched Distributed Denial of Service (DDoS) attacks targeting prominent Australian companies like Auditco and Wavcabs. While the exact motive remains unclear, the timing suggests a political backlash against Australia's solidarity with Ukraine.

Wavcabs experienced disruptions to its online services, while Auditco encountered technical difficulties believed to be linked to these attacks. Despite the cyber onslaught, Australia remained steadfast in its support for Ukraine, announcing a $100 million aid package comprising military assistance and defense industry support. Read More
British Columbia Thwarts Government Cyberattack, Strengthens Defenses

British Columbia’s government recently confirmed an attempt to infiltrate their information systems. The incidents were identified as “sophisticated cybersecurity incidents” by B.C.’s solicitor-general and public safety minister. There is no current evidence suggesting that personal information, such as health records, was compromised. The government's proactive measures in 2022 played a significant role in detecting the breach.

The government ensured to further secure systems, including requiring government employees to change their passwords. Officials and cybersecurity experts continue to work to ensure sensitive information remains secure and to prevent unauthorized access. The country appears to be using this incident to prepare itself for future cyber threats. Read More
Urgent Chrome Update: Google Patches Sixth Zero-Day of 2024

A new vulnerability in Google Chrome was uncovered, marking their sixth zero-day incident in 2024. Google swiftly released an emergency update to patch the issue, ensuring users' safety. Updates were promptly distributed across Mac, Windows, and Linux platforms.

For those concerned about their security, updating their devices is crucial. Users can navigate to Settings > About Chrome to initiate the update process. While Google has not disclosed specific details about the breach, the urgency conveyed by their release of an "emergency patch" underscores the severity of the situation. Read More

To Wrap Up

Cyberattacks continue to dominate headlines, but this week's TCE Cyberwatch report also reveals positive developments. Governments are taking action, with proactive measures in British Columbia and the UK's AI safety testing platform. Organizations are prioritizing security, as seen in Lenovo's "Secure by Design" initiative.

Individuals play a crucial role too. The recent Google Chrome update reminds us to prioritize software updates. While cyber threats persist, these advancements offer a reason for cautious optimism. By working together, we can build a more secure digital future.

Remember, vigilance is key. Update your software regularly and follow best practices to minimize vulnerabilities. TCE Cyberwatch remains committed to keeping you informed.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

The Guardian view on antimicrobial resistance: we must prioritise this global health threat | Editorial

By: Editorial
17 May 2024 at 13:30

Patients are already dying as wonder drugs lose their effectiveness. International action is urgently needed

As apocalyptic horror stories go, it’s up there with the scariest. Yet it’s not fiction writers but top scientists who are warning of how the world could look once superbugs develop resistance to the remaining drugs against them in our hospital pharmacies. Patients will die who can currently be cured; routine surgery will become dangerous or impossible. Antimicrobial resistance (AMR) – it happens not only with bacteria but also viruses, fungi and parasites – is one of the top global public health threats facing humanity, says the World Health Organization (WHO). It kills 1.3 million people and contributes to 5 million deaths every year, predicted to be 10 million by 2050. In addition to the appalling human toll, it will increase the strain on and costs of health services. But is it high enough up the agenda? Covid-19 knocked it off, and the climate crisis gets more attention. AMR does not so often get top billing.

This week efforts have been made to change that, with talks at the UN triggering wider coverage chronicling the sorry plight we are in. From the pharmaceutical industry to the WHO to NHS England, the same tune is being played: we are not doing enough to avert disaster.

Continue reading...

💾

© Photograph: Julien Behal/PA

💾

© Photograph: Julien Behal/PA

The Guardian view on footballing greats: their words reach beyond beautiful game | Editorial

By: Editorial
17 May 2024 at 13:25

The departure this weekend of Chelsea’s Emma Hayes from the WSL and Liverpool’s Jürgen Klopp will be felt outside sport

The departure this weekend of two of England’s most influential and successful football managers will be felt beyond sport. There’s no doubt that the loss of Chelsea’s Emma Hayes from the Women’s Super League and Liverpool’s Jürgen Klopp from the Premier League offers important lessons for the game on why leadership matters. Their personalities and tactical nous demonstrated why managers can help clubs do better than their players’ skills alone suggest.

Both managers also gave football a human face. Hayes was appointed by Chelsea in August 2012. Her team won 15 trophies, averaging more than one a year. She could sign off with a 16th on Saturday, with this season’s title race between Chelsea and Manchester City going down to the final match. She became synonymous with the English game at home and abroad and displayed her acute analytical sense of the game as a TV pundit.

Continue reading...

💾

© Photograph: Adrian Dennis/AFP/Getty Images

💾

© Photograph: Adrian Dennis/AFP/Getty Images

The Cyber Express Sets the Stage to Host World CyberCon META Edition 2024 in Dubai 

World CyberCon META Edition 2024

This May, the heartbeat of the cybersecurity industry will resonate through Dubai, where The Cyber Express is set to host the much-anticipated third iteration of the World CyberCon META Edition 2024.   Scheduled for May 23, 2024, at Habtoor Palace Dubai, this premier event promises a comprehensive day filled with immersive experiences tailored to address the dynamic challenges and innovations in cybersecurity.  This year’s theme, "Securing Middle East’s Digital Future: Challenges and Solutions," lays the foundation for a unique gathering that is crucial for any professional navigating the cybersecurity landscape.   The World CyberCon META Edition will feature a stellar lineup of more than 40 prominent Chief Information Security Officers (CISOs) and other cybersecurity leaders who will share invaluable insights and strategies. Notable speakers include: 
  • Sithembile (Nkosi) Songo, CISO, ESKOM  
  • Dina Alsalamen, VP, Head of Cyber and Information Security Department, Bank ABC  
  • Anoop Kumar, Head of Information Security Governance Risk & Compliance, Gulf News  
  • Irene Corpuz, Cyber Policy Expert, Dubai Government Entity, Board Member, and Co-Founder, Women in Cyber Security Middle East (WiCSME)   
  • Abhilash Radhadevi, Head of Cybersecurity, OQ Trading  
  • Ahmed Nabil Mahmoud, Head of Cyber Defense and Security Operations, Abu Dhabi Islamic Bank 

The World CyberCon META Edition 2024

[caption id="attachment_68285" align="alignnone" width="1140"]World CyberCon META Edition 2024 Highlights from the 2023 World CyberCon in Mumbai.[/caption] A Comprehensive Platform for Learning & Innovation  The World CyberCon META Edition 2024 promises a rich agenda with topics ranging from the nuances of national cybersecurity strategies to the latest in threat intelligence and protection against advanced threats. Discussions will span a variety of crucial subjects including: 
  • Securing a Digital UAE: National Cybersecurity Strategy 
  • Predictive Cyber Threat Intelligence: Anticipating Tomorrow’s Attacks Today 
  • Navigating the Cyber Threat Terrain: Unveiling Innovative Approaches to Cyber Risk Scoring 
  • Fortifying Against Ransomware: Robust Strategies for Prevention, Mitigation, and Swift Recovery 
  • Strategic Investments in Cybersecurity: Leveraging AI and ML for Enhanced Threat Detection 
Who Should Attend?  The World CyberCon META Edition 2024 is tailored for CISOs, CIOs, CTOs, security auditors, heads of IT, cybercrime specialists, and network engineers. It’s an invaluable opportunity for those invested in the future of internet safety to gain insights, establish connections, and explore new business avenues.  Engage and Network  In addition to knowledge sessions, the conference will feature interactive workshops, an engaging exhibition zone, and plenty of networking opportunities. This event is set to honor the significant contributions of cybersecurity professionals and provide them with the recognition they deserve.  Secure Your Place  Don’t miss this unique chance to connect with leading professionals and gain insights from the forefront of cybersecurity. Reserve your spot at World CyberCon META Edition 2024 by visiting (https://thecyberexpress.com/cyber-security-events/world-cybercon-3rd-edition-meta/).  More Information  For more details on the event sponsorship opportunities and delegate passes, please contact Ashish Jaiswal at ashish.j@thecyberexpress.com.  About The Cyber Express  Stay informed with TheCyberExpress.com, your essential source for cybersecurity news, insights, and resources, dedicated to empowering you with the knowledge needed to protect your digital assets.   Join us in shaping the digital future at World CyberCon META Edition 2024 in Dubai. Let’s secure tomorrow together! 

CBSE Results 2024 Under Threat: Database Vulnerability Could Compromise Student Scores

CBSE results 2024

As the Central Board of Secondary Education (CBSE) in India released the CBSE results 2024 for its class 10th and 12th examinations, a significant cybersecurity flaw was discovered on the official website. This vulnerability, identified by The Cyber Express, could potentially allow unauthorized individuals to view and alter students' examination results. The exams for Class 12 were held from February 15 to April 2, and for Class 10 from February 15 to March 13, conducted using traditional pen-and-paper methods where a total of 3,860,051 students appeared. Of these, 1,621,224 students participated in the Class 12 exams, while a significantly larger group of 2,238,827 students took the Class 10 exams. On Monday, students could access their results online by entering details such as their date of birth, roll code, and roll number. But the security loophole, discovered early this morning, could potentially lead to a massive CBSE data leak, affecting millions of students across India.  The vulnerability was first noticed early this morning when the results were supposed to be securely accessible to students and their families. The flaw on the CBSE website revolves around the exposure of administrative credentials and a technical misconfiguration in the SQL database system, specifically within a stored procedure called 'Getcbse10_All_2024'. To the average person, this might merely seem like a glitch, but it's a significant security flaw that provides an opportunity for malicious actors to manipulate and misuse crucial information, including outcomes. The ramifications are profound, as this vulnerability endangers the personal and academic data of countless students, potentially impacting their future opportunities.

CBSE Results 2024: Student Data Risk Explained

[caption id="attachment_68160" align="alignnone" width="2648"]CBSE Results 2024 The error message also includes connection string details, which are critical for connecting to the database but should never be exposed as they can lead to security risks.[/caption] The code message displayed on the website originates from a database query related to retrieving data concerning CBSE (Central Board of Secondary Education) Class 10 results for the year 2024. 'Getcbse10_All_2024' refers to a stored procedure in the database. A stored procedure is a prepared SQL code that you can save and reuse. In this case, it's likely a procedure intended to retrieve all data related to the CBSE Class 10 results for the year 2024. The procedure 'Getcbse10_All_2024' is expecting a parameter named '@admid', but it was not provided in the call to the procedure. The '@admid' likely stands for "Administrator ID" or a similar identifier that should be passed to the procedure to execute properly. The absence of this parameter means the procedure cannot run as intended, leading to an error. The error message also includes connection string details, which are critical for connecting to the database but should never be exposed as they can lead to security risks. provider=MSOLEDBSQL: This specifies the provider used for SQL Server. MSOLEDBSQL is a Microsoft OLE DB provider for SQL Server. server=10.***.10.***: This is the IP address of the server where the database is hosted. Knowing the server address can allow unauthorized users to attempt connections to the database. Database=****results**: This is the name of the database. Knowing the database name helps in directing queries and commands to the correct database. uid=cbseresults24; pwd=****************** : These are the credentials (username 'uid' and password 'pwd') used to authenticate to the database. With these credentials, an unauthorized user could potentially gain full access to the database, allowing them to view, modify, or delete data. Although the exposed data presents a significant risk, a researcher from the AI-powered threat intelligence platform, Cyble, noted that the threat potential is somewhat mitigated by incomplete information disclosure. “The IP address is internal and not public, which means that for a threat actor to extract information or gain access, they would need to engage in offensive actions like SQL injections or other methods. However, this does not diminish the seriousness of the exposed ID and password, which could still be exploited if the correct server address is discovered,” the researcher explained. The error message not only indicates a technical issue in the database query execution but also highlights a potential vulnerability. If exploited by an individual skilled in database management and privilege escalation, this vulnerability could allow unauthorized access to the database. Such unauthorized access could lead to various security risks, including data manipulation, deletion, or use for malicious purposes such as phishing or blackmail. Immediate steps should be taken to secure the database, which include changing the database credentials, reviewing logs to check for unauthorized access, and implementing better security practices like not exposing sensitive information in error messages or logs.

Why CBSE Matters

The Central Board of Secondary Education (CBSE) is a prominent national education board in India, overseeing both public and private schools. It is under the direct purview of the Ministry of Education, Government of India. The CBSE administers comprehensive examinations for students completing their 10th and 12th grades, which are crucial for advancing to higher education and professional pathways. The board is recognized for its rigorous curriculum and is influential in setting educational standards across the country. The Cyber Express has contacted officials at the Central Board of Secondary Education (CBSE) to notify them of a detected vulnerability. We inquired if they are aware of the issue, the causes of this glitch, and the steps they intend to take to address it. We are currently awaiting a response from the organization.

Technical Aspect of the CBSE Data Exposure: Potential Risks

The exposure of the admin database ID and password in the CBSE data leak opens up several potential risks. While none of these events have occurred, the exposure of such critical credentials could lead to severe consequences if not addressed promptly. 1. Unauthorized Access and Control: With the admin credentials exposed, there is a potential for unauthorized users to gain full access to the CBSE's SQL database. This would allow them to view, copy, and manipulate sensitive data, including examination results and student personal information. 2. Risk of Data Manipulation: The ability to alter data is a significant risk. Although no data has been reported as altered, the possibility exists. Unauthorized changes could include tampering with examination results or modifying student records, which could severely undermine the integrity of the CBSE's educational assessments. 3. Threat of Data Theft: The exposed credentials could potentially be used to access and extract sensitive information. This data, which could include personal details of students and staff, is at risk of being used for malicious purposes such as identity theft or fraud. 4. Potential for Operational Disruption: While no disruptions have occurred, the exposed credentials could be used to damage data integrity or lock out legitimate users, potentially causing significant disruptions to CBSE's operations and affecting educational activities. 5. Foundation for Further Attacks: The leak itself could facilitate further attacks. With administrative access, attackers could deploy additional malicious software, establish backdoors for continued access, or leverage the compromised database to launch attacks on connected systems. The situation remains fluid, and updates are expected as more information becomes available. Stay subscribed to The Cyber Express to learn more about the story as it proceeds. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Major Changes in NIST Cybersecurity Framework 2.0: Enhancements and Adoption Strategies

NIST Cybersecurity Framework

The NIST Cybersecurity Framework (CSF) is a framework designed to provide cybersecurity risk-management guidance to private and public industries, government agencies, and other organizations . It is intended to be applicable for use by any organization regardless of it's size or scale, age, or sector. The version 2.0 of the cybersecurity framework is much more extensive with its core guidance and lists additional subcategories as well as links to online resources that offer further guidance on practices to achieve these objectives. The guidance is divided into six areas of focus: identify, protect, detect, respond, recover, and govern. This article unravels the NIST Cybersecurity Framework, the major changes outlined in CSF 2.0, and some of the ways in which it can be adopted.

The NIST Cybersecurity Framework

Overview

The NIST Cybersecurity Framework (NIST CSF) was first introduced in 2014 by the National Institute of Standards and Technology to bolster the security of infrastructure within the United States. By establishing a common set of standards, goals, and terminology to reduce the risk and impact of cyberattacks. By promoting the shared framework, the NIST CSF aids in better decision-making and encourages security standards to address threats such as phishing and ransomware. The initial version was updated to Version 1.1 in 2018, adopting major changes such the inclusion of the Identify core function, additional sub-categories and improved clarity. The draft copy for version 2.0 of the framework was released with the intention of receiving public feedback in August 2023 and closed for comments in November 2023, the final release of Version 2.0 was released in February 2024. Since the new framework demonstrates increased flexibility to various situations, the NIST has recommended its voluntary self-adoption by organizations of all sizes.

Target Audience

The primary audience for the framework comprises of individuals responsible for developing and overseeing cybersecurity planning and strategization within organizations. It is also relevant for other roles involved in risk management, such as executives, board of directors, acquisition professionals, technology experts, risk managers, legal professionals, human resource specialists, and auditors who specialize in cybersecurity and risk management. Additionally, the CSF can serve as a useful asset to those involved with the making and influencing of private and public policy (e.g., associations, professional organizations, regulators) who establish and communicate priorities for cybersecurity risk management.

Major Changes in NIST Cybersecurity Framework 2.0

Released in February 2024, the NIST Cybersecurity Framework 2.0 is the latest revision to the framework.

Inclusion of 'Govern' Core Function

While the previous framework stated 'Identify, Protect, Detect, Respond, and Recover' as its core functions in implementation, the new framework includes 'Govern.' Govern seeks to addresses the establishment of cybersecurity strategy, cybersecurity supply chain risk management, roles, responsibilities, authorities, policy, and the oversight of cybersecurity strategy within the  organizational context.

More Extensive Sub-categories and References within Core Functions

CSF version 2.0 includes additional categories and subcategories of cybersecurity goals and standards within the listed core functions, as well as hundreds of other helpful references to assist readers. The new framework is much more extensive with its definitions and resources.

Expanded Scope

The new framework’s scope has expanded beyond just the protection of critical infrastructure, such as water facilities and power plants, to providing safety standards for all organizations regardless of sector or size. This expanded scope is reflected in the change of the CSF’s official title to “The Cybersecurity Framework,” from the earlier “Framework for Improving Critical Infrastructure Cybersecurity.” This reflects an earlier request from the US Congress for the framework to expand its guidance to aid small businesses.

Framework Tiers

The new tiers define how a company handles cybersecurity risks, allowing them to adopt the tier that best fulfills their objectives, decrease cyber risk to a desirable level while accounting for difficulties in implementation. The tiers offer progress starting from 1 ('Partial') to 4  (‘Adaptive’) with rising level of sophistication but additional efforts in implementation.

Framework Profiles

The CSF profiles aid companies in finding the right path that’s right for them to reduce cybersecurity risks. Each profile lays out an organization’s “current” and “target” positions and in meeting the criteria in transforming from one profile to the other.

Focus on Supply-Chain and  Third-Party Risk

The framework incorporates new supply chain guidelines as part of the core 'Govern' function, and expects that cybersecurity risks within software supply chains should be considered while an organization carries out its functions. Moreover, the NIST framework reminds organizations to plan and conduct due diligence to reduce risks prior to entering agreements with supplier or other third-party contractors. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Global Infosec Awards 2024: Cyble Wins Nine Accolades, Recognized Among the Best in Cybersecurity

Global Infosec Awards 2024 Cyble

Cyber Defense Magazine (CDM), marking its 12th anniversary as the leading electronic information security magazine, announced the winners of the prestigious Global InfoSec Awards at the RSA Conference 2024  After an exhaustive six-month search across 3500 companies worldwide, CDM has identified the top innovators in cybersecurity, awarding nearly 10% of these as winners for their outstanding contributions to the industry.  This year's RSA Conference, a cornerstone event for cybersecurity professionals, has been especially significant. It showcased groundbreaking advancements amid increasing challenges such as sophisticated ransomware, business email compromise, and exploits targeting Cloud, IoT, and OT environments, alongside a surge in cyber-crime and cyber-terrorism.  In a new age of hybrid workforces and advances in AI, there's an equally exponential growth in new kinds of ransomware, business email compromise, Cloud, IoT and OT exploitation, deep phishing attacks, cyber-crime and cyber terrorism. Only the most innovative and forward-thinking Cybersecurity solutions will give us a fighting chance," said Yan Ross, Editor-in-Chief of Cyber Defense Magazine.  [caption id="attachment_67131" align="alignnone" width="1600"]Cyble Team at RSAC 2024 Cyble Team at RSAC 2024[/caption]

Global Infosec Awards 2024: Cyble Clinches 9 Honors

Shortly thereafter, Cyber Defense Magazine also published a list of Global Infosec Awards for 2024 Winners by category -- Company. Among the standout recipients, AI-based cyber threat intelligence firm Cyble has notably excelled, securing multiple accolades in key cybersecurity arenas. Renowned for their proactive and visionary approach, Cyble has been honored with: 
  • Cyble: Editor's Choice – Account Takeover Protection 
  • Cyble: Trailblazing – Attack Surface Management 
  • Cyble: Pioneering – Continuous Threat Exposure Management (CTEM) 
  • Cyble: Pioneering – Cyber Exposure Management 
  • Cyble: Pioneering – Data Loss Prevention (DLP) 
  • Cyble: Pioneering – Digital Risk Protection 
  • Cyble: Pioneering – Third Party Cyber Risk 
  • Cyble: Trailblazing – Threat Intelligence 
  • Cyble: Trailblazing – Vulnerability Intelligence 
These awards emphasize Cyble's commitment to building strong cybersecurity defenses aimed at protecting businesses from today's most critical threats.  "Receiving these accolades at the Global InfoSec Awards is a tremendous honor for us," said Beenu Arora, the co-founder of Cyble. It’s a testament to the hard work and dedication of our team, particularly in our innovative AI technology. As we face increasingly complex cyber threats, these recognitions reinforce our commitment to pushing the boundaries of AI-driven cybersecurity solutions to better protect our clients."  Cyble, the leading provider of AI-driven cybersecurity solutions, is currently participating at the prestigious RSA Conference 2024, held at Moscone South Expo, San Francisco, from May 6 to May 9.  Visitors at Cyble's Booth N-2353 at RSAC 2024 can see firsthand how Cyble is transforming cybersecurity practices and strengthening network resilience. At RSA Conference 2024, Cyble is showcasing its innovative Cyble Vision Platform through engaging live demonstrations, illustrating how it enables organizations to proactively address cybersecurity threats.  For more information or to schedule a personal meeting with any of the leadership team members, please visit the event page at https://cyble.com/upcoming-events/rsa-conference-2024/  RSA Conference is the global stage for the cybersecurity industry, providing a platform for professionals to connect, share insights, and advance security technologies. This annual event brings together the brightest minds in cybersecurity, featuring in-depth sessions, keynotes, and training from leading experts in the field.   About Cyber Defense Magazine  With over five million monthly readers, Cyber Defense Magazine is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. About Cyble Cyble, a trailblazer in Cyber Threat Intelligence, is committed to democratizing Dark Web Threat Intelligence through advanced AI and Machine Learning solutions. Recognized as one of the most sought-after workplaces, Cyble’s culture fosters innovation, collaboration, and professional growth. With a proven track record in delivering cutting-edge research and proactive monitoring, Cyble stands at the forefront of the cybersecurity landscape. Headquartered in Atlanta, Georgia, and with a global presence spanning Australia, Malaysia, Singapore, Dubai, Saudi Arabia, and India, Cyble is the trusted authority empowering organizations to proactively combat evolving cyber threats.
❌
❌