Category: CySecurity News – Latest Information Security and Hacking Incidents

Crypto Scammers Are Targeting AI Trade Bots

  The blockchain security company CertiK disclosed how a new generation of scammers is changing their tactics to target automated trading bots in the wake of the LIBRA meme currency fiasco, in which insiders were given advanced information of the…

Strengthening PC Security with Windows Whitelisting

  Windows Defender, the built-in antivirus tool in Windows, provides real-time protection against malware by scanning for suspicious activity and blocking known threats using an extensive virus definition database. However, no antivirus software can completely prevent users from unknowingly installing…

Beware of Fake Viral Video Links Spreading Malware

  McAfee Labs has uncovered a rise in cyber scams where fraudsters use fake viral video links to trick people into downloading malware. These attacks rely on social engineering, enticing users with promises of exclusive or leaked content.  Once a…

Building Robust AI Systems with Verified Data Inputs

  Artificial intelligence is inherently dependent on the quality of data that powers it for it to function properly. However, this reliance presents a major challenge to the development of artificial intelligence. There is a recent report that indicates that…

Role of Continuous Threat Exposure Management in Business Security

  Continuous threat exposure management (CTEM) is a framework for proactively managing and mitigating threat exposure using an iterative approach that emphasises on developing structured organisational procedures as well as leveraging security tools.  In this article, we’ll go over CTEM,…