Security

By offering pre-packed, plug-and-play malware, the MaaS market has enabled even inexperienced attackers to carry out potentially disruptive attacks regardless of their skill level or technical ability.

The US$75 million payment made to the Dark Angels ransomware group was discovered by Zscaler's security research arm ThreatLabz earlier this year.

The rapid rise of AI mimics previous transformative shifts, such as the internet and cloud computing. Just as early cloud adopters navigated new challenges, today's companies must contend with the complexities introduced by widespread AI adoption.

Gartner has released a research note outlining short-term, intermediate, and long-term measures CrowdStrike users can implement to deal with what's become the update from hell.

Security risk management software firm Panorays shed new light on the worsening network security problems workers cause. This internal threat occurs when employees use their organization's network to experiment with generative AI and other AI tools.

Forrester identified top emerging technologies in its latest report, highlighting their potential benefits, use cases, and risks for businesses.

Corporate employers often complain about graduates applying for IT jobs without any hands-on cyber experience. This gap drove officials at Bridgewater State University to create a unique cyber training program to fill that void.

An effective approach to children’s online safety needs to strike a balance between protecting kids' user privacy and free speech, as well as distributing responsibility to the government, online services, and parents, according to a new ITIF report.

Cybersecurity firm DataDome estimates that 4 billion cyberattacks will be launched during the games, primarily targeting businesses in adjacent industry sectors.

A study released Tuesday by digital risk protection solutions company Memcyco found that nearly three-quarters of businesses have deployed a digital impersonation protection solution to avert online scams, but only 6% of those organizations are satisfied that it protects them and their customers.

Cat-phishing, using a popular Microsoft file transfer tool to become a network parasite, and bogus invoicing are among the notable techniques cybercriminals deployed during the first three months of 2024, according to the quarterly HP Wolf Security Threat Insights Report.

To effectively counteract the sophisticated threats posed by deepfake technologies, organizations must enhance their identity and access management systems with the latest advancements in detection and encryption technologies. This proactive approach will not only reinforce the security of biometric...

Brute force cracking of passwords takes longer now than in the past, but the good news is not a cause for celebration, according to the latest annual audit of password cracking times released Tuesday by Hive Systems.

Nearly two dozen dating apps were flagged by Mozilla's Privacy Not Included researchers as failing to meet privacy and security standards, sharing customer data with third parties, and excluding the right of a user to wipe their data from the app.

Technewsworld Channels