Generative Data Intelligence

Tag: cybercriminals

Nigeria, Romania Ranked Among Top Cybercrime Havens

An academic research project to gain insight into which nations produce the most cybercrime has ranked the usual suspects of Russia, Ukraine, China, and...

Top News

AI and the Malleable Frontier of Payments

The Midas touch of financial technology is transforming the way we pay. Artificial intelligence algorithms are weaving themselves into the fabric of payments, promising to streamline transactions,...

Thousands of Australian Businesses Targeted With RAT

More than 11,000 Australian companies were targeted in a recent wave of cyberattacks that rely on an aging but still dangerous malware strain dubbed...

Secure Online Payments and Finding Peace of Mind for Every Purchase

And just like that our wallets have morphed from leather companions to lines of code. This newfound convenience, however, comes with a chilling reality: online transactions...

How CISOs Can Make Cybersecurity a Long-Term Priority for Boards

COMMENTARYCybersecurity has never been more critical for responsible corporate governance, as cyberattacks are among the gravest threats to companies' customers, operations, and reputations. Boards must...

Ransomware, Junk Bank Accounts: Cyberthreats Proliferates in Vietnam

For one week last month, Vietnamese brokerage VNDirect Cyber Systems shut down its securities trading systems and disconnected from the country's two stock exchanges...

Instilling the Hacker Mindset Organizationwide

COMMENTARYThe saying "put yourselves in the shoes of a hacker" has long been part of defensive security strategies. Today, in the fast-paced and evolving...

Cyber Threats Intensify in Middle East During Ramadan

The holy month of Ramadan is a period where Middle East-based companies step up cybersecurity with extra vigilance and outsourced support amid shortened working...

Collaboration Needed to Fight Ransomware

COMMENTARYThe dramatic imagery of law enforcement "kicking down doors" to disrupt ransomware operations captures the essence of the tangible actions taken against cybercriminals. Having...

TRON Dominates Nearly 50% of Illicit Crypto Activity: TRM Labs Report

The TRON network accounted for 45% of all illicit volume in 2023, according to data released by analysts at blockchain forensics firm TRM Labs. TRM...

TRON Dominates Nearly 50% of Illicit Crypto Activity: TRM Labs Report

The TRON network accounted for 45% of all illicit volume in 2023, according to data released by analysts at blockchain forensics firm TRM Labs. TRM...

Cloud Email Filtering Bypass Attack Works 80% of the Time

Computer scientists have uncovered a shockingly prevalent misconfiguration in popular enterprise cloud-based email spam filtering services, along with an exploit for taking advantage of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?