Category: EN

Rising Abuse of URL Rewriting in Phishing

The abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious links behind trusted domains of security vendors. Exploiting these features enables bypassing detection mechanisms. This article has been indexed from…

McAfee Unveils Tool to Identify Potential Deep Fakes

McAfee today added a tool to detect deep fakes to its portfolio that will initially be made available on PCs from Lenovo that are optimized to run artificial intelligence (AI) applications. The post McAfee Unveils Tool to Identify Potential Deep…

FlightAware Notifies Users of Data Security Incident

FlightAware, a provider of real-time flight tracking information, has informed users of a data security incident that may have exposed personal information. The company is taking precautionary measures by requiring all potentially impacted users to reset their passwords. The incident,…

Publishers Spotlight: Bedrock Security

I was thrilled to catch up with Bedrock Security during Black Hat USA 2024.  The surge in data volume from cloud and GenAI initiatives, coupled with escalating threats to enterprises’… The post Publishers Spotlight: Bedrock Security appeared first on Cyber…

OpenCTI: Open-source cyber threat intelligence platform

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web application architecture with…

Experts Weigh In on the NPD Breach and Its Implications

The NPD breach, one of the most significant cybersecurity incidents in history, exposed the personal data of nearly three billion people, including Social Security numbers, addresses and email addresses. A cybercriminal group carried out the breach called “USDoD,” which claimed…