Category: welivesecurity

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe This article has been indexed from WeLiveSecurity Read the original article: How to share sensitive files…

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk This article has been indexed from WeLiveSecurity Read the original article: Vulnerabilities in business…

All eyes on AI | Unlocked 403: A cybersecurity podcast

Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack the basics and examine AI’s broader implications. This article has been indexed from WeLiveSecurity Read the original…

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: ChatGPT, the MOVEit…

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management This article has been indexed from WeLiveSecurity Read the original article: Assessing and mitigating supply chain…