X-Force Identifies Vulnerability in IoT Platform – post by LinkCyb

The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a […]

Italy bans ChatGPT over data privacy concerns – post by LinkCyb

In a move that one Italian minister has called “disproportionate”, Italy has temporarily banned ChatGPT due to data privacy concerns. Italy has made the decision to temporarily ban ChatGPT within the country due to concerns that it violates the General Data Protection Regulation (GDPR). GDPR is a law concerning data and data privacy which imposes […]

X-Force Prevents Zero Day from Going Anywhere – post by LinkCyb

This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as […]

Speed Dating with Security Executives: Thoughts From a CEO – post by LinkCyb

To better understand market dynamics and our clients’ challenges, I ensure I communicate regularly with those on the front lines, either at a practitioner or executive level. Recently, I participated in an executive event where vendors and delegates are matched based on responsibilities, projects, and solution fit. Being in the software industry for over 20 […]

The Impact of Decentralization on Security – post by LinkCyb

Introduction to Blockchain Decentralization Over the past months, Security Innovation tested several blockchain applications. Testing began by creating a threat model, in which a major component was the security of the underlying blockchain itself. While all the blockchains Security Innovation studied shared many similarities, including the use of a Byzantine Fault Tolerant style Proof of […]