Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Exfiltration: What It Is, Examples, and Prevention Tips

Data security is vital to your organization’s well-being. Even a single data exfiltration incident can bring unwanted attention to your organization, leading to reputational and financial losses. That’s why companies across industries pay maximum attention to their cybersecurity measures and constantly enhance them. In this article, we explain the meaning of data exfiltration and how it’s performed.

HCA Healthcare Loses Data for Over 11 Million in Recent Breach

HCA Healthcare is one of the largest health systems in the United States today. The company has millions of patients and manages data for countless hospitals, private practices, specialty offices, and more. With such a substantial volume of healthcare data contained in one location, the information is vulnerable to attack. That's exactly what happened to HCA Healthcare. The company suffered a data attack that left it with substantial losses.

Threat Actors Add ".Zip" Domains to Phishbait

Cybercriminals are exploiting the introduction of “.ZIP” as a new generic Top-Level Domain (gTLD) to launch phishing attacks, according to researchers at Fortinet. “Cybercriminals are always on the lookout for new opportunities and techniques to exploit, and the recent availability of '.ZIP' domains for public purchase has unfortunately created such an opportunity,” the researchers write.

Best practices for using AI in the SDLC

AI has become a hot topic thanks to the recent headlines around the large language model (LLM) AI with a simple interface — ChatGPT. Since then, the AI field has been vibrant, with several major actors racing to provide ever-bigger, better, and more versatile models. Players like Microsoft, NVidia, Google, Meta, and open source projects have all published a list of new models. In fact, a leaked Google document makes it seem that these models will be ubiquitous and available to everyone soon.

Finding and fixing insecure direct object references in Python

An insecure direct object reference (IDOR) is a security vulnerability that occurs when a system’s implementation allows attackers to directly access and manipulate sensitive objects or resources without authorization checks. For example, an IDOR can arise when an application provides direct access to objects based on user-supplied input, allowing an attacker to bypass authorization.

Diligent and Bitsight Partner to Increase Board Confidence in Cyber Risk Oversight

Today, Bitsight and Diligent launched an extension of our partnership focused on correlated, independent, and comparable cyber ratings from Bitsight within Diligent’s Board Reporting for IT Risk. Streamlined data collection and standardized dashboards enable CISOs to deliver clear and consistent insights to the board leveraging Bitsight and Diligent solutions.

Not all cybersecurity analytics are created equal: What CISOs should look for

Cybersecurity leaders are always working to make smarter investments to improve their programs. Not only do they look to reduce risk from the expanding attack surface and manage supply chain risk, they’re also juggling external pressures from regulators, insurers, and shareholders. As leaders look to technology solutions to help, many look at data analytics to reduce their organization’s risk, manage exposure, and improve overall program performance.