Tag: EN

Today’s biggest AI security challenges

98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to HiddenLayer. The report surveyed 150 IT security and data science…

Tazama: Open-source real-time fraud management

Tazama is an open-source platform focused on improving fraud management within digital payment systems. Tazama marks a substantial transformation in the approach to financial monitoring and compliance worldwide. Previously, the financial sector struggled with proprietary solutions that were both expensive…

Delving into Dalvik: A Look Into DEX Files

During the analysis of a banking trojan sample targeting Android smartphones, Mandiant identified the repeated use of a string obfuscation mechanism throughout the application code. To fully analyze and understand the application’s functionality, one possibility is to manually decode the…

How to Adopt Phishing-Resistant MFA

In a recent blog post, we discussed what phishing-resistant multi-factor authentication (MFA) is and why… The post How to Adopt Phishing-Resistant MFA appeared first on Axiad. The post How to Adopt Phishing-Resistant MFA appeared first on Security Boulevard. This article…

A cybercriminal is sentenced, will it make a difference?

The darknet is home to many underground hacking forums in which cybercriminals convene, freely sharing stories, tactics, success stories and failures. Their unguarded discussions allow our team to peek into the politics and ethics behind recent adversary activities. The threat…

WoTLabs – 21,994 breached accounts

In March 2024, WoTLabs (World of Tanks Statistics and Resources) suffered a data breach and and website defacement attributed to "chromebook breachers". The breach exposed 22k forum members’ personal data including email and IP addresses, usernames, dates of birth and…

Home Voice Assistant Security: Protecting Your Privacy

Concerned about the privacy risks of home voice assistants? Discover effective strategies to protect your personal information in this comprehensive guide. The post Home Voice Assistant Security: Protecting Your Privacy appeared first on Security Zap. This article has been indexed…

NSA Details Seven Pillars Of Zero Trust

The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization’s network to access sensitive data and vital systems. This offers instructions on how to use Zero Trust principles to strengthen internal…

Hackers Use Number of Legitimate Tools in Ransomware Attacks

Ransomware attacks remain a formidable challenge for organizations worldwide. These attacks not only encrypt critical data, rendering it inaccessible to the rightful owners but increasingly involve the exfiltration of sensitive information.  This dual-threat approach amplifies the potential damage, as attackers…

Hackers Exploiting iOS 0-Day To Attack iPhones – Patch Now!

Apple releases emergency fixes to address two new zero-day vulnerabilities in iOS that impact iPhones. The two zero-day vulnerabilities were discovered in RTKit, tracked as CVE-2024-23296, and the iOS Kernel, tracked as CVE-2024-23225. If exploited by an attacker with kernel…

Smart Home Automation: Balancing Convenience and Security

Leveraging the power of smart home automation while safeguarding against potential risks is crucial for homeowners seeking the perfect balance between convenience and security. The post Smart Home Automation: Balancing Convenience and Security appeared first on Security Zap. This article…

What Is Domain Monitoring and Why Do I Need It?

Have you ever worried about your website domain’s well-being? If not, you definitely should. The post What Is Domain Monitoring and Why Do I Need It? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…