logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Archive by category "Cybersecurity Compliance"

Page 27

Read more

How digital forensics unlocks the truth

February 17, 2024 / 28 / 0
[ad_1] The burgeoning field of digital forensics plays a crucial role in investigating a wide range of cybercrimes and cybersecurity incidents. Indeed, in our technology-centric world, even investigations of ‘traditional’ crimes often include an element of digital evidence that is waiting to be retrieved and... Continue reading
Read more

What is AI? Unlocked 403

February 17, 2024 / 36 / 0
[ad_1] Video Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack the basics and examine AI’s broader implications. 15 Feb 2024 Artificial intelligence (AI) is clearly the topic du jour as... Continue reading
Read more

Google Warns Unfair AI Rules Could Empower Hackers

February 17, 2024 / 38 / 0
[ad_1] Google has called for a balanced regulatory approach to AI in order to avoid a future where attackers can innovate but defenders are stifled by law. Google’s call comes following the launch of a new whitepaper “Secure, Empower, Advance: How AI Can Reverse the... Continue reading
Read more

Hackers Exploit EU Agenda in Spear Phishing Campaigns

February 16, 2024 / 32 / 0
[ad_1] Organizations based in the EU are being targeted by spear phishing campaigns leveraging EU political and diplomatic events, according to the bloc’s Computer Emergency Response Team (CERT-EU). In its Threat Landscape Report 2023, published on February 15, 2024, CERT-EU found that lures exploiting the... Continue reading
Read more

New Ivanti Vulnerability Observed as Widespread Security Concerns Grow

February 16, 2024 / 53 / 0
[ad_1] Read more on Ivanti vulnerabilities: Bad news continues to pile up for Utah-based IT software provider Ivanti as a new vulnerability has been discovered in its products. On February 8, Ivanti disclosed a new authentication bypass vulnerability impacting its Connect Secure, Policy Secure, and... Continue reading
Read more

PDF Malware on the Rise, Used to Spread WikiLoader, Ursnif and DarkGat

February 16, 2024 / 34 / 0
[ad_1] PDF threats are on the rise with cybercriminals spreading malware, including WikiLoader, Ursnif and DarkGate, through PDFs, a new report by HP Wolf Security has found. The company’s analysis saw a 7% rise in PDF threats in Q4 2023, compared to Q1 of the... Continue reading
Read more

Microsoft, OpenAI Confirm Nation-States are Weaponizing Generative AI

February 16, 2024 / 26 / 0
[ad_1] Nation-state threat actors are making use of generative AI tools, including large language models (LLMs) like ChatGPT, in their cyber operations, new research by Microsoft and OpenAI has confirmed. Threat groups from Russia, China, North Korea and Iran are leveraging generative AI to support... Continue reading
Read more

Prudential Financial Faces Cybersecurity Breach

February 16, 2024 / 45 / 0
[ad_1] Prudential Financial has disclosed a cybersecurity breach. Detected on February 5 2024, the breach involved unauthorized access to certain company systems. In a filing with the US Securities and Exchange Commission (SEC) on February 12 2024, Prudential said it immediately activated its cybersecurity incident response protocol... Continue reading
Read more

“TicTacToe Dropper” Malware Distribution Tactics Revealed

February 15, 2024 / 25 / 0
[ad_1] A recent study conducted by the FortiGuard team has shed light on a sophisticated malware distribution strategy observed throughout 2023.  In a technical write-up published on Wednesday, the team identified a series of malware droppers dubbed the “TicTacToe dropper,” which were utilized to deliver various... Continue reading
Read more

Crypto-Money Laundering Records 30% Annual Decline

February 15, 2024 / 28 / 0
[ad_1] Just over $22bn worth of cryptocurrency was laundered in 2023, a 30% drop from the previous year, with nefarious actors switching techniques to stay hidden from investigators, according to Chainalysis. The blockchain analysis company claimed in a new report that some of the decline... Continue reading
Next Page »

Search