Using AI to fight hand-crafted Business Email Compromise
August 21 2020Using natural language models to identify Business Email Compromise (BEC)
Read moreUsing natural language models to identify Business Email Compromise (BEC)
Read moreCOVID-19 won't be the last major disruption of its kind. Instead, it is a glimpse into what may be to come as digitalization continues to affect all aspects of...
Read moreResearchers advise Amazon Web Services users running Community Amazon Machine Images to verify them for potentially malicious code.
Read moreTwo recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.
Read moreTwo recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.
Read moreThe charges stem from a 2016 attack in which 57 million records were breached.
Read moreThe high profile attack should spur serious board-level conversations around the importance of insider threat prevention.
Read moreResearchers discover a lack of explicit memory protections around the shared memory used by the Db2 trace facility.
Read moreFearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.
Read more
Recent Comments