Defending Against the Use of Deepfakes for Cyber Exploitation
December 7 2021Deepfakes are increasingly concerning because they use AI to imitate human activities and can be used to augment social engineering attacks.
Read moreDeepfakes are increasingly concerning because they use AI to imitate human activities and can be used to augment social engineering attacks.
Read moreSince 2017, someone is running about a thousand — 10% of the total — Tor servers in an attempt to deanonymize the network:
Grouping these servers under the KAX17...
Read more
Part mainframe, part mobile device, cars will increasingly become targets for cyberattackers.
Read moreThe program helps close the skill gap to enable defenders to gain the advantage over cyber adversaries.
Read moreThe so-called Nikel cyber espionage attack group - aka APT15, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon - has been in Microsoft's sights since 2016.
Read moreGen. Paul Nakasoke, head of US Cyber Command and director of the NSA, said the military has taken offensive action against ransomware groups.
Read moreClusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say.
Read moreOrganizations want to focus on customer satisfaction and increased revenues during the holiday shopping season. Here are some smart security and fraud protections to keep in mind.
Read moreSEARCH is a carefully-tuned methodology that balances people, process and technology for threat hunters actively searching for, and disrupting, distinctly human threats.
Read moreFrom Ontario and not surprising:
Since September 2021, officers have investigated five incidents where suspects have placed small tracking devices on high-end vehicles so they can later locate and...
Read more
Recent Comments