Tag: EN

Daon xSentinel minimizes generative AI voice fraud

Daon announced the addition of xSentinel, an expansion of its AI.X technology. xSentinel provides adaptive synthetic voice protection to create a layer of defense within any voice communication channel and enhance the identity verification technologies suite on Daon IdentityX and…

1Kosmos partners with AWS to offer MFA for customer use cases

1Kosmos announced it has completed the integration of its 1Kosmos BlockID platform with Amazon Cognito. As an AWS Advanced Technology Partner, 1Kosmos enables Amazon customers to seamlessly add passwordless multi-factor authentication (MFA) to their customer-facing web and mobile application journeys.…

Building a Robust Threat Intelligence with Wazuh

Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It enables organizations to gain a comprehensive insight into historical, present, and anticipated threats, providing context about the constantly evolving threat…

New Krasue Linux RAT targets telecom companies in Thailand

A previously undetected Linux RAT dubbed Krasue has been observed targeting telecom companies in Thailand. Group-IB researchers discovered a previously undetected Linux remote access trojan called Krasue has been employed in attacks aimed at telecom companies in Thailand. The Krasue…

Atlassian Patches Critical Remote Code Execution Vulnerabilities

Atlassian has released patches for critical-severity remote code execution flaws in Confluence and other products. The post Atlassian Patches Critical Remote Code Execution Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

Researchers automated jailbreaking of LLMs with other LLMs

AI security researchers from Robust Intelligence and Yale University have designed a machine learning technique that can speedily jailbreak large language models (LLMs) in an automated fashion. “The method, known as the Tree of Attacks with Pruning (TAP), can be…

Meta and Microsoft double-down on AI

Artificial intelligence has the potential to change every industry and businesses are racing to harness those capabilities for the benefit of their users (and shareholders).… The post Meta and Microsoft double-down on AI appeared first on Panda Security Mediacenter. This…

How to Avoid and Prevent Identity Theft

Identity theft is like a thief in the night; it can happen to anyone, anywhere, at any time. It is a real threat to everyone. We live in a time where so much personal information is stored online, which allows…

Top Security Trends and Predictions for 2024

Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in mobile security. Based on this data, we wanted…

Cambridge Hospitals Admit Two Excel-Based Data Breaches

Information on cancer and maternity patients was accidentally disclosed by Cambridge University Hospitals NHS Foundation Trust This article has been indexed from www.infosecurity-magazine.com Read the original article: Cambridge Hospitals Admit Two Excel-Based Data Breaches