How AI is transforming human risk management
While human error has always posed a cybersecurity risk, AI and emerging tech are playing an evolving role in Human […]
How AI is transforming human risk management Read Post »
While human error has always posed a cybersecurity risk, AI and emerging tech are playing an evolving role in Human […]
How AI is transforming human risk management Read Post »
Pixelator v2 is a tool to spot fake images. It uses a new combination of image veracity techniques with capability
Data scientists create tool to spot fake images Read Post »
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers reveal exploitable flaws in
A new set of 15 SpyLoan Android malware apps with over 8 million installs was discovered on Google Play, targeting
SpyLoan Android malware on Google play installed 8 million times Read Post »
A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law
Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested Read Post »
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials.
New Rockstar 2FA phishing service targets Microsoft 365 accounts Read Post »
Noteworthy stories that might have slipped under the radar: OnePoint Patient Care data breach impact doubles, a US soldier may
T-Mobile has confirmed being targeted by hackers, likely China’s Salt Typhoon, but reiterated that the attack was blocked. The post
T-Mobile Shares More Information on China-Linked Cyberattack Read Post »
Microsoft informed customers that vulnerabilities affecting cloud, AI and other services have been patched, including an exploited flaw. The post
Microsoft Patches Exploited Vulnerability in Partner Network Website Read Post »