Generative Data Intelligence

Tag: attack vectors

Mobile Banking Malware on the Rise Amid Rapid Adoption – Fintech Singapore

by Fintech News Singapore March 26, 2024 Mobile banking is a rapidly growing market that’s projected to hit a value of US$7 billion by 2032. However,...

Top News

Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory

Fresh proof-of-concept (PoC) exploits are circulating in the wild for a widely targeted Atlassian Confluence Data Center and Confluence Server flaw. The new attack...

The Ongoing Struggle to Protect PLCs

COMMENTARYTen years have passed since the infamous Stuxnet attack highlighted the vulnerabilities of the operational technology (OT) systems that play a crucial role in...

10 Essential Processes for Reducing the Top 11 Cloud Risks

It's an old trope by now that anyone not moving to the cloud is falling behind. As a result, cloud security has been on...

The Rise of Social Engineering Fraud in Business Email Compromise

Social engineering is present in 90% of phishing attacks today. However, business email compromise (BEC) attacks stand apart in the cybercrime industry for their emphasis on social...

Chinese APT Developing Exploits to Defeat Patched Ivanti Users

A Chinese espionage group is on the verge of developing malware that can persist in Ivanti edge devices even after patches, upgrades, and factory...

Entro Extends Machine Secrets and Identities Protection With Machine Identity Lifecycle Management

PRESS RELEASEBOSTON, Feb. 27, 2024 (GLOBE NEWSWIRE) -- Entro, an Israeli cybersecurity startup offering machine identity secrets security and management, has extended its award-winning platform...

Collaborating for Standardized Threat Investigation & Response

Data is the lifeblood of any organization's security strategy. Data from dozens of security and IT tools spread out across an enterprise's expansive multicloud...

Should security be immutable?

Blockchains were created with immutability as one of its fundamental principles and to many the thought of introducing limited mutability contradicts the very foundations...

Deepfake Democracy: AI Technology Complicates Election Security

Recent events, including an artificial intelligence (AI)-generated deepfake robocall impersonating President Biden urging New Hampshire voters to abstain from the primary, serve as a...

What will the future of Cybersecurity bring?

Our world is reliant on technology. It shapes and influences nearly everything we do—from the moment we wake up until we go to sleep....

Aim Security Raises $10M to Secure Generative AI Enterprise Adoption

PRESS RELEASETEL AVIV, Israel--(BUSINESS WIRE)--Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million in...

Break the fake: The race is on to stop voice cloning fraud

Scams As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?