Please turn on your JavaScript for this page to function normally.
malware
Researchers uncover DarkGate malware’s Vietnamese connection

WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) …

money
The double-edged sword of heightened regulation for financial services

Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through …

biometrics
As biohacking evolves, how vulnerable are we to cyber threats?

Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies, according to …

target
Cybercriminals can go from click to compromise in less than a day

The median dwell time in ransomware engagements dropped to just under 24 hours from 4.5 days in the previous year and 5.5 days in the year before that, according to …

Phishing
LLMs lower the barrier for entry into cybercrime

Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt …

lock
Cybersecurity preparedness pays big dividends for businesses

Businesses are taking cybersecurity more seriously by boosting resources and preparedness, according to GetApp. US businesses on the whole are gaining ground against …

keyboard
Protecting against FraudGPT, ChatGPT’s evil twin

FraudGPT is the evil counterpart to ChatGPT. Criminals use it to target businesses with phishing emails and scams with speed and accuracy like never before. The AI can be …

DDoS
Global events fuel DDoS attack campaigns

Cybercriminals launched approximately 7.9 million DDoS attacks in 1H 2023, representing a 31% year-over-year increase, according to NETSCOUT. Global events like the …

artificial intelligence
How should organizations navigate the risks and opportunities of AI?

As we realize exciting new advancements in the application of generative pre-trained transformer (GPT) technology, our adversaries are finding ingenious ways to leverage these …

data analytics
Why California’s Delete Act matters for the whole country

The California State Legislature passed Senate Bill 362, known as the Delete Act, to simplify the process for consumers to ask to remove their personal data gathered by data …

ransomware
Ransomware groups are shifting their focus away from larger targets

One in every six ransomware attacks targeting US government offices was traced back to the LockBit ransomware group, according to Trend Micro. Overall ransomware attack victim …

vulnerability
High number of security flaws found in EMEA-developed apps

Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to …

Don't miss

Cybersecurity news