Category: EN

SpyLoan Apps: The New Face of Financial Exploitation

The McAfee mobile research team has identified a significant global rise in predatory loan applications, commonly referred to as SpyLoan apps, which primarily target Android users. These applications, classified as potentially unwanted programs (PUP), utilize social engineering tactics to manipulate users…

As Device Dependency Grows, So Do the Risks

It’s no stretch to say connected devices are taking over the world. In every sector and country, endpoints are driving newfound efficiencies inside the smart home, office, and warehouse. These devices – from sensors to smart meters and industrial controllers…

Anticipating Change: Key Cybersecurity Trends to Watch in 2025

Thanks to the fantastic response we received, we’re excited to continue our exploration of the evolving cybersecurity landscape. As we approach 2025, the challenges and threats facing businesses, governments, and individuals are becoming increasingly complex. Following our initial insights, we…

Imperva Defends Against LLM Hacking

In the evolving landscape of cybersecurity, the advent of large language models (LLMs) has introduced a new frontier of challenges and opportunities. Research has shown advanced LLMs, such as GPT-4, now possess the ability to autonomously execute sophisticated cyberattacks, including…

Alleviating Alert Fatigue with an MSSP

By Euan Carswell, SOC Team Lead at Barrier Networks Everyone can relate to the 7AM alarm call. You can be in a deep sleep when suddenly your ears are met with an incessant pinging that won’t stop until you muster…

SmokeLoader Attack Targets Companies in Taiwan

FortiGuard Labs has uncovered an attack targeting companies in Taiwan with SmokeLoader, which performs its attack with plugins this time. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: SmokeLoader Attack Targets…

Fortinet Contributes to Major Cybercrime Operation Arrests

Fortinet contributes to major INTERPOL and AFRIPOL cybercrime operations arrests of members of cybercrime groups operating across Africa. These individuals specialize in ransomware, digital extortion, online scams, and Business Email Compromise (BEC) attacks.        This article has been indexed from…

Amazon and Google Must Keep Their Promises on Project Nimbus

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> When a company makes a promise, the public should be able to rely on it. Today, nearly every person in the U.S. is a customer of either…

🍿 Today’s Double Feature: Privacy and Free Speech

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> It’s Power Up Your Donation Week! Right now, your contribution to the Electronic Frontier Foundation will go twice as far to protect digital privacy, security, and free speech rights for everyone.…

Speaking Freely: Aji Fama Jobe

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> *This interview has been edited for length and clarity. Aji Fama Jobe is a digital creator, IT consultant, blogger, and tech community leader from The Gambia. She…