Safe operation
-
Safe operations from the perspective of Party A and Party B
Large Internet enterprises in the exploration of enterprise information security, and gradually put forward the concept of security operations. For the ultimate guarantee of enterprise security needs, but also as an important responsibility of security operations, it is necessary to close the loop on all aspects of enterprise security through security operations practitioners.
-
Google open-sources Magika AI document recognition
Google has open sourced the Magika artificial intelligence (AI) file recognition tool.Magika utilizes deep learning models to improve the accuracy and speed of file type recognition. This tool is primarily geared for use by cybersecurity personnel to more accurately detect binary and text file types.
-
Google open-sources artificial intelligence (AI)-assisted fuzzy testing framework
As open source software plays an increasingly important role in the technology ecosystem, its security concerns are becoming more pronounced. Fortunately, Google's recently open-sourced Artificial Intelligence (AI)-assisted fuzz testing (Fuzzing) framework provides a new security solution to this challenge.
-
Five years of safe operation practice summary and future thinking
The report emphasizes the need for security operations automation, pointing out that 80%'s security operations can be automated, which not only saves a lot of manpower, but also promotes the interconnection of security devices. Liu Yixiang looks at the future of operational intelligence, which will enable immediate adaptive handling of events and alarms, as well as adaptive remediation of vulnerabilities.
-
Offense for Defense: Ransomware Attacks in Action
This post focuses on the global landscape of ransomware attacks, the current state of the industry, and why attackers favor such attacks. The report points out that losses from ransom attacks mainly stem from business interruption, ransom payment and data leakage, and the amount of losses continues to climb. Domestically, companies are adopting a strategy of dealing with ransom incidents in secret, while regulators have also issued related prevention requirements. The article also describes the development of the ransom attack industry, including the rise of the "ransom-as-a-service" model.
-
Cybersecurity Challenges for Industry 4.0
The Fourth Industrial Revolution, or Industry 4.0, is seen as the next step after the industrialization of computer automation that has occurred over the past fifty years. This new revolution is driven by buzzwords such as IIoT (Industrial Internet of Things), integrated cyber-physical systems, big data, artificial intelligence and digital twins. It's no different in the chemical industry. But no matter how they make facilities "smarter," all of these technologies have two things in common: they are data-driven and require hyper-connectivity. These two characteristics represent the next big challenge for cybersecurity in these industrial environments.
-
SecuSphere: Open Source One-Stop Solution for DevSecOps
SecuSphere is a comprehensive DevSecOps platform designed to simplify and enhance your organization's security posture throughout the software development lifecycle. Our platform is the central hub for vulnerability management, security assessments, CI/CD pipeline integration, and fostering DevSecOps practices and culture.
-
Sixteen countries around the world jointly release guidelines for the development of safe artificial intelligence systems
Guidance for any system provider using artificial intelligence (AI), whether those systems are created from scratch or built on tools and services provided by others.
-
Building data security operation capabilities from the perspective of Didi security incidents
1. Introduction On the evening of December 9, 2021, the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) detonated the world. This vulnerability can be called an epic vulnerability, with a CVSS score of 10 out of 10, affecting…
-
The rise and fall of 0day: A review of the year 0day was exploited in 2022
This is Google’s fourth annual review [2021, 2020, 2019] of 0day vulnerabilities exploited in the wild, and is based on the mid-2022 review. The purpose of this report is not to detail each individual vulnerability, but to analyze vulnerabilities throughout the year, looking for trends, gaps, lessons learned, and successes.