logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Archive by category "Cybersecurity Compliance"

Page 73

Read more

How AI changes the monetization of search

October 22, 2023 / 49 / 0
[ad_1] We Live Progress, Digital Security Search engines, AI, and monetization in the new era 14 Aug 2023  •  , 4 min. read The opening keynote at Black Hat 2023, unsurprisingly, was on the topic of AI. Specifically, the presentation discussed the implications of AI’s... Continue reading
Read more

Hacking the police (at least their radios)

October 22, 2023 / 43 / 0
[ad_1] Critical Infrastructure, Cybercrime Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure. 15 Aug 2023  •  , 2 min. read   We read about hacking law enforcement radio systems, then attended... Continue reading
Read more

Spearphishing targets in Latin America – Week in security with Tony Anscombe

October 22, 2023 / 48 / 0
[ad_1] Video ESET’s analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments 20 Oct 2023 This week, ESET researchers announced the release of a report that looked at more than... Continue reading
Read more

Robot vacuums may be doing more than they claim

October 21, 2023 / 46 / 0
[ad_1] Internet of Things, Privacy When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. 16 Aug 2023  •  , 3 min. read A presentation at DEF CON, 10 am on a Sunday morning in Las... Continue reading
Read more

The Universe of Threats in LATAM

October 21, 2023 / 41 / 0
[ad_1] ESET Research ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting 17 Oct 2023  •  , 3 min. read Much like the life and mysterious demise of Pharaoh Tutankhamun, also known as King Tut,... Continue reading
Read more

10 tips to build an effective business backup strategy

October 21, 2023 / 51 / 0
[ad_1] Business Security How robust backup practices can help drive resilience and improve cyber-hygiene in your company 18 Oct 2023  •  , 5 min. read Could your company survive if its most critical data stores were suddenly encrypted or wiped out by cybercriminals? This is... Continue reading
Read more

top 3 security awareness topics for your employees

October 21, 2023 / 59 / 0
[ad_1] Business Security Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats 19 Oct 2023  •  , 5 min. read It’s Cybersecurity Awareness Month (CSAM) time again this October. This is an awareness-raising initiative that... Continue reading
Read more

DarkGate Malware Campaigns Linked to Vietnam-Based Cybercriminals

October 20, 2023 / 61 / 0
[ad_1] Vietnam-based cybercriminals are believed to be behind to attacks using DarkGate malware, which have targeted organizations in the UK, US and India since 2018. WithSecure researchers have tracked these attacks to an active cluster of cybercriminals using the Ducktail infostealer, which has been used... Continue reading
Read more

ENISA Warns of AI Manipulation Ahead of Upcoming European Elections

October 20, 2023 / 30 / 0
[ad_1] The use of AI chatbots and AI-enabled manipulation of information by malicious actors is a key threat ahead of the upcoming 2024 elections across the continent, according to the European Union Agency for Cybersecurity (ENISA). The 11th edition of ENISA’s Threat Landscape report, published... Continue reading
Read more

Hacker Group GhostSec Unveils New Generation Ransomware Implant

October 20, 2023 / 54 / 0
[ad_1] Dark web watchdog SOCRadar has revealed that GhostSec, a self-described “vigilante” group that has recently turned to financially motivated cyber activity, has released a novel type of ransomware, called GhostLocker. GhostSec presents GhostLocker as a game-changing locking software that includes military-grade encryption during runtime... Continue reading
Next Page »

Search