UK authority calls for integral data protection in AI amid increasing breaches

UK authority calls for integral data protection in AI amid increasing breaches

The Information Commissioner's Office (ICO), the UK authority in charge of overseeing the use and collecting of personal data, has revealed that it received reports on more than 3,000 cyber breaches in 2023. 

This figure highlights an urgent concern in the world of technology: the need for strong data protection measures, particularly in the development of AI technologies. The UK's data watchdog has issued a warning to tech companies, demanding that data protection be...

Phylum uncovers targeted malware disguised in Python package

Phylum’s cybersecurity experts have detected a malicious payload embedded within a popular Python package on the PyPI repository. The package, named requests-darwin-lite, is an unauthorised variant of the widely-used requests library.

The requests-darwin-lite package was cleverly designed to emulate its legitimate counterpart but included a Go binary concealed within an oversized image file pretending to be a simple logo. This file – a PNG labelled as a sidebar image –...

Open letter criticises ‘flawed’ CSAM scanning plan

An open letter signed by 270 scientists and researchers across 33 countries has raised major technical concerns about the EU's proposed regulation mandating the scanning of messaging apps for child sexual abuse material (CSAM). The signees argue the techniques are fundamentally flawed and will "completely undermine communications and systems security."

"From a technical standpoint, to be effective, this new proposal will also completely undermine communications and systems...

CISA sounds alarm on critical GitLab flaw under active exploit

The US Cybersecurity and Infrastructure Security Agency (CISA) has labelled a critical vulnerability affecting the popular Git-based repository manager GitLab as a Known Exploited Vulnerability (KEV). The move comes in response to active exploitation attempts detected in the wild, underscoring the urgency for organisations to promptly apply security updates.

Tracked as CVE-2023-7028, the severe flaw (CVSS score: 10.0) could enable adversaries to take over user accounts by sending...

Google blocked 2M malicious apps from the Play Store in 2023

Google blocked 2.28 million policy-violating apps from being published on the Play Store in 2023, thanks to improved security measures and tighter developer vetting processes. The company rejected or had developers remediate almost 200,000 app submissions to prevent abuse of sensitive permissions like location tracking and SMS access.  

The company says providing a safe and trusted Play Store experience is its top priority, underpinned by principles to "safeguard users",...

GitHub’s 2FA rollout boosts supply chain security

In a push to enhance the security of the software supply chain, GitHub has successfully rolled out mandatory two-factor authentication (2FA) for code contributors on its platform.

GitHub’s 2FA rollout – announced in May 2022 – aimed to address the critical first link in the software supply chain by securing the developers responsible for designing, building, and maintaining the software we all rely on.

The results are in

After a year of meticulous preparation,...

What developers can learn from the largest DDoS attack in history

This past October, Google Cloud disclosed that it had successfully mitigated the largest Distributed Denial of Service (DDoS) attack in history – and that this DDoS attack had been hitting businesses since August.

What made it the worst DDoS to date? It was the volume. At its peak, the attack counted over 398 million requests per second (rps). To compare, the worst recorded DDoS attack up to that point, detected in 2022, reached 46 million rps.

The fall 2023 attack,...

Fortifying app security with the help of Terraform

A staple of DevOps tech stacks, Terraform is an Infrastructure-as-Code (IaC) provisioning and management tool developed by HashiCorp. While Terraform itself is rarely associated with app security and is not directly related to the safety and cyber protection of applications, using it correctly is pivotal in the implementation of security best practices. 

As DevOps continues to morph into DevSecOps, and as supply chain attacks continue to breach enterprise systems,...

Bitwarden strengthens passwordless authentication with magic links API

Credential management firm Bitwarden has announced an enhancement to its Passwordless.dev platform with the release of a magic links API.

Bitwarden’s latest offering empowers developers to seamlessly integrate passwordless authentication into their applications, providing a more secure and user-friendly experience for end-users.

The magic links API enables developers to send unique one-time-use links via email, allowing users to securely access their accounts or easily...

PyPI suspends registrations amid malware attack

The Python Package Index (PyPI) has suspended new project creation and user registration to mitigate an ongoing malware upload campaign. This move comes as security researchers at Checkmarx uncovered a campaign involving multiple malicious packages related to the same threat actors.

The attackers are targeting victims through typosquatting attacks, tricking users into installing malicious Python packages through their command-line interface. This multi-stage attack aims to steal...