Generative Data Intelligence

Tag: exfiltration

S3 Ep110: Spotlight on cyberthreats – an expert speaks [Audio + Text]

by Paul Ducklin SPOTLIGHT ON CYBERTHREATS Security specialist John Shier tells you the “news you can really use” – how to...

Where Are We Heading With Data Privacy Regulations?

With 65% of the global population expected to have its personal data covered under modern privacy regulations by 2023, respecting data privacy has never...

Bahamut cybermercenary group targets Android users with fake VPN apps

Malicious apps used in this active campaign exfiltrate contacts, SMS messages, recorded phone calls, and even chat messages from apps such as Signal,...

Luna Moth’s Novel, Malware-Free Extortion Campaign Takes Flight

Researchers have spotted a threat actor that has managed to extort hundreds of thousands of dollars over the last few months from mostly small...

Charting the Path to Zero Trust: Where to Begin

Digital transformation is a journey, and much like any adventure, a bit of preparation can go a long way in driving a successful outcome....

Secure Offboarding in the Spotlight as Tech Layoffs Mount

Increased turnover is putting a strain on existing offboarding processes — especially manual ones — for departing employees and contractors. Recent high-profile layoffs at...

Poisoned Python and PHP packages purloin passwords for AWS access

by Paul Ducklin A keen-eyed researcher at SANS recently wrote about a new and rather specific sort of supply chain attack against open-source software modules in...

EDR and How It Can Help You Be Even More Prepared

Reading Time: 3 minutesEarly warning systems save lives. People in tsunami risk zones rely on seismic activity sensors and sea level gauges...

EDR and How It Can Help You Be Even More Prepared

Reading Time: 3 minutesEarly warning systems save lives. People in tsunami risk zones rely on seismic activity sensors and sea level gauges...

The top 3 lessons that we can learn from Equifax Hack

Reading Time: 3 minutesFor those of us who have a credit report, there’s a good chance that our sensitive personal information was...

Comodo Discovers Equifax Executives’ Passwords for Sale

Reading Time: 2 minutesFollowing the Equifax data breach revelations, the Comodo Threat Intelligence Lab undertook a Dark Web analysis on the company...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?