Deepfake attacks have seen a significant increase globally, with Spain and the APAC region experiencing notable challenges due to their advanced digital infrastructure, posing risks of identity theft, scams, and misinformation campaigns.
Sentra’s DSPM webinar featuring SoFi shares success stories and practical guidance for enhancing data security strategies in the cloud.
A recent cybersecurity discovery reveals how attackers trick Windows users into opening a Microsoft Access file, allowing them to extract and transmit the user’s NTLM tokens.
A campaign targeting major Iranian banks has been discovered, involving an Android mobile banking Trojan that steals login credentials, credit card information, and intercepts SMS for one-time password codes, with new app variants and capabilities being identified.
Europol-led operation dismantles ransomware group in Ukraine responsible for high-profile attacks on corporations worldwide.
An international law enforcement operation led by Europol and the European Union Agency for Criminal Justice Cooperation has successfully dismantled a ransomware group in Ukraine responsible for high-profile attacks on corporations worldwide.
The use of generative AI tools like ChatGPT has led to a significant increase in phishing attacks, although cybercriminals themselves are skeptical and wary of the risks associated with these tools.
North Korean APT groups, including Lazarus and BlueNoroff, are blending elements of software from RustBucket and KandyKorn campaigns to confuse victims and researchers and evade detection in their attacks on cryptocurrency exchanges and financial institutions.
Retailers must prioritize the security of their SaaS applications to protect against cyber attacks and data breaches during the holiday season.
The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) have collaborated to publish comprehensive global guidelines for securely developing and deploying AI systems.
Passive network attackers can obtain private RSA host keys from vulnerable SSH servers by observing computational faults during connection establishment, allowing them to masquerade as compromised hosts and intercept sensitive data.