4 Ways to Fight AI-Based Fraud
Generative AI is being used to make cyberscams more believable. Here’s how organizations can counter that using newly emerging tools…
Exclusive insights on cybersecurity
Generative AI is being used to make cyberscams more believable. Here’s how organizations can counter that using newly emerging tools…
Organizations can use this guide to make decisions for designing, implementing, and managing OT environments to ensure they are both…
Despite a $10 million bounty on one member, APT45 is not slowing down, pivoting from intelligence gathering to extorting funds…
All an attacker needs to exploit flaws in the Common Unix Printing System is a few seconds and less than…
A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well…
A previously undocumented threat actor called CeranaKeeper has been linked to a string of data exfiltration attacks targeting Southeast Asia.…
A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single…
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote…