Tag: EN

Incident Response Policy

This policy from TechRepublic Premium provides information on defining an incident, assigning an incident response team, documenting a plan and conducting a response. It can be customized to meet the needs of your organization. Featured text from the policy: DOCUMENT…

Chinese Hackers Using Deepfakes in Advanced Mobile Banking Malware Attacks

A Chinese-speaking threat actor codenamed GoldFactory has been attributed to the development of highly sophisticated banking trojans, including a previously undocumented iOS malware called GoldPickaxe that’s capable of harvesting identity documents, facial recognition data, and intercepting SMS. “The GoldPickaxe family is available…

iOS users beware: GoldPickaxe trojan steals your facial data

Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing…

Miscreants turn to ad tech to measure malware metrics

Now that’s what you call dual-use tech Cyber baddies have turned to ad networks to measure malware deployment and to avoid detection, according to HP Wolf Security.… This article has been indexed from The Register – Security Read the original…

Cybersecurity as a Revenue Driver: Insights for MSPs

< p dir=”ltr”>Managed Service Providers (MSPs) are the unsung heroes for businesses navigating the complex terrain of technology. As the backbone of IT operations for many organizations, MSPs not only ensure operational efficiency but also play a critical role in…

Nation-state actors are using AI services and LLMs for cyberattacks

Microsoft and OpenAI warn that nation-state actors are using ChatGPT to automate some phases of their attack chains, including target reconnaissance and social engineering attacks. Multiple nation-state actors are exploiting artificial intelligence (AI) and large language models (LLMs), including OpenAI…

AI outsourcing: A strategic guide to managing third-party risks

In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this approach comes with its own set of risks. From data security concerns to operational disruptions, understanding…

Cloud-Native Security Challenges and Solutions

In the world of cloud-native applications, organizations face intricate security challenges that require careful consideration and innovative solutions. The post Cloud-Native Security Challenges and Solutions appeared first on Security Zap. This article has been indexed from Security Zap Read the…

Riding Dragons: capa Harnesses Ghidra

capa is the FLARE team’s open source tool that detects capabilities in executable files. Ghidra is an open source software reverse engineering framework created and maintained by the National Security Agency Research Directorate. With the release of capa v7, we have integrated…

Cyber Attack news headlines trending on Google

Bank of America Data Breach by Infosys Bank of America (BOA) has filed accusations against Infosys US, alleging a data breach that compromised details of its employees and some customers. The breach report was submitted to the Office of Maine…