“The Kneeling Man” – with Leta McCollough Seletsky
Leta McCollough Seletsky joins Andrew Hammond to share the story of her father, the famous “Kneeling Man” – The man knelt next to Dr. Martin Luther King Jr. at his assassination at the Lorraine Motel in 1968. Leta is a litigator turned essayist and memoirist. Read More
Hackers steal 15,000 cloud credentials from exposed Git config files
A global large-scale dubbed “EmeraldWhale” exploited misconfigured Git configuration files to steal over 15,000 cloud account credentials from thousands of private repositories. […] Read More
Microsoft Announced AI Bug Bounty Program that Rewards Up to $15,000
Microsoft created a new AI Bug Bounty program, which rewards people who help improve the AI Power Bing experience. The rewards range from $2,000 to $15,000.
The initial release of AI-powered Bing’s scope product aims to provide enhanced security against emerging vulnerabilities. Through the integration of AI technology, Bing offers innovative experiences that directly impact the safety of our customers. The information has been reported by Microsoft.
You can get bounty awards for the following goods and integrations:
AI-powered Bing experiences on bing.com in Browser (All significant vendors are supported, including Bing Chat, Bing Chat for Enterprise, and Bing Image Creator)
AI-powered Bing integration in Microsoft Edge (Windows), including Bing Chat for Enterprise
AI-powered Bing integration in the Microsoft Start Application (iOS and Android)
AI-powered Bing integration in the Skype Mobile Application (iOS and Android)
The service aids Microsoft customers in maintaining a competitive edge by providing timely updates on evolving tools and security concerns.
Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware
Microsoft’s new AI incentive program is the product of extensive research and development over the past few months.
These discoveries and investments include an AI security research challenge and an update to Microsoft’s vulnerability severity rating for AI systems.
Even if researchers didn’t receive a bounty payout for their findings, they may still receive public recognition if their findings lead to the discovery and fixing of a vulnerability.
They may receive points in our researcher recognition program, which can be redeemed for merchandise and a spot on Microsoft’s Most Valuable Researcher list.
General Awards
As a way of protecting its customers from harmful attacks, Microsoft works closely with security researchers through special programs. Microsoft would like to express its gratitude to all the partners who have helped in this effort.
Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.
How to Conduct Advanced Static Analysis in a Malware Sandbox
[[{“value”:”Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However, they also offer plenty of value in terms of static analysis. See these five scenarios where a sandbox can prove to be a useful tool in your investigations.
Detecting Threats in PDFs
PDF files are frequently exploited by threat actors to”}]] Read More
The Hacker News | #1 Trusted Cybersecurity News Site