The IJC Blog
Our official blog with news from the industry, technology and business
A Comprehensive Guide to Detecting and Mitigating Data Exfiltration Threats
Data exfiltration, also known as data theft exportation, or extrusion, involves a cyber attacker stealing data from a computer or system. Protecting your systems against data exfiltration has always been crucial, but the topic gained even more interest with the rise of AI tools. These tools introduce a new set of challenges for companies, as data theft methods become more and more sophisticated and harder to detect. Don’t confuse exfiltration with data leakage and data breach. A leakage will be an unintentional exposure of sensitive data, that may be due to a procedural error or a vulnerability in the system. A data breach refers to any type of security incident that results in the unauthorized access of data. Data exfiltration can result from both a leakage and a breach, but not all data leakages or breaches will result in exfiltration. For instance, someone might take advantage of a data leakage and encrypt part of the data to use as ransom. The intention is not to steal the data itself, but only to get money or another ransom in return for the encrypted data. Data exfiltration can have serious consequences for your company, such as, The stolen data makes your systems
Last week’s news
Last week’s news: Microsoft announced a new tool to detect hallucinations in AI outputs. Google’s NotebookLM can now summarize YouTube video.
A Comprehensive Guide to Detecting and Mitigating Data Exfiltration Threats
Data exfiltration, also known as data theft exportation, or extrusion, involves a cyber attacker stealing data from a computer or system. Protecting your systems against
How to respond a data exfiltration attack
Sometimes, no matter how many preventive measures you have in place and how much you train your employees, disaster strikes, and you find yourself experiencing
How to know that a data exfiltration attack is on its way
Data exfiltration is one of the hardest attacks to detect because it hides behind normal day-to-day processes. Plus, most such attacks won’t disrupt your systems
Preventing data exfiltration
Data exfiltration can cause serious havoc on your business, and hackers have no shortage of options to carry out such attacks. This variety makes some
How does data exfiltration happen?
Data exfiltration or data theft can significantly impact your business, leading to revenue and reputation loss and making your systems more vulnerable than before. But
Data exfiltration
Data exfiltration, also known as data theft exportation, or extrusion, involves a cyber attacker stealing data from a computer or system. Protecting your systems against
Last week’s news
Last week’s news: Microsoft announced a new tool to detect hallucinations in AI outputs. Google’s NotebookLM can now summarize YouTube video.
Tech News – September 26 & 27
From the news: Apple and Meta refused to join EU’s AI Pact. Google’s NotebookLM can now summarize YouTube videos.
Tech News – September 24 & 25
From the news: Microsoft announced a new tool to detect and correct hallucinated in AI outputs. Microsoft will add watermarks to DALL-E.
Last week’s news
Last week’s news: Google will label AI-generated and AI-edited images in Search. The European Commission starts monitoring Apple
Tech News – September 19 & 20
From the news: LinkedIn scraped user data to train generative AI models, but not from the EU. The European Commission starts monitoring Apple
Tech News – September 17 & 18
From the news: Google will label AI-generated and AI-edited images in Search. Discord launched end-to-end encrypted voice and video chats
Daily News – 30th of August 2023
FBI dismantled the infrastructure of Qakbot malware after it infected over 700,000 computers
Google will charge businesses $30 per user per month for AI in Gmail, Drive, Slides, Docs, and more
LG and Samsung announced that their home appliances will work with each other’s apps
Daily News – 29th of August 2023
OpenAI launched ChatGPT Enterprise for businesses
A flaw in the Skype mobile app can reveal the IP address
Google unveiled real-time environmental APIs
Daily News – 28th of August 2023
The European Union’s Digital Services Act (DSA) has gone into effect
Windows 11 will add native RAR support
Microsoft president stressed the pressing need for “real clarity” on AI regulation
Top news this week, 21st-25th of August 2023
Meta launched Code Llama, a code-generating AI model
Google launched a new algorithm that makes FIDO encryption safe from quantum computers
IBM will use generative AI to translate COBOL code into Java
Daily News – 25th of August 2023
Meta launched Code Llama, a code-generating AI model
Google will add 2FA verification to Gmail settings
Meta will shut down Messenger Lite for Android in September
Daily News – 24th of August 2023
Google and Samsung will collaborate on “Project Moohan”, a new XR headset
A WinRAR zero-day vulnerability hides malware in JPG and TXT files
Google is testing a feature for YouTube that will allow users to find songs by humming