Tag: EN

Security, privacy, and generative AI

Since the proliferation of large language models (LLMs), like OpenAI’s GPT-4, Meta’s Llama 2, and Google’s PaLM 2, we have seen an explosion of generative AI applications in almost every industry, cybersecurity included. However, for a majority of LLM applications,…

When traditional AV solutions are not enough

Preventing cybercriminals from exfiltrating your data with ADX technology Webinar  It seems counterintuitive to want to lock in a cybercriminal who has crept past all your defences to smuggle data out from under your nose.… This article has been indexed…

Introducing the tech that keeps the lights on

Genuinely new ideas are rare in IT – this superhero is ready to make a real difference Opinion  Cybersecurity has many supremely annoying aspects. It soaks up talent, time, and money like the English men’s football squad, and like that…

A Simplified Overview of the MITRE ATT&CK Framework

In the world of cybersecurity, have you ever wondered about the inner workings of threat actors as they attempt to breach systems, their methods, tactics, and strategies, and how they seamlessly converge to execute a successful attack? It’s not merely…

Cloud Watching Report: Key Takeaways

The capabilities of cloud computing have changed the digital landscape significantly, and the popularity of cloud solutions only continues to increase. According to Gartner , the market for public cloud services is expected to surpass 700 billion USD by the…

Microsoft Resolves Outage Affecting Teams, Xbox Live

Outage affects thousands of Teams, Xbox Live users in UK, Germany, other European countries on launch day of new Call of Duty game This article has been indexed from Silicon UK Read the original article: Microsoft Resolves Outage Affecting Teams,…

Authorities Took Down Massive Phishing-as-a-service Provider

A notorious phishing service that supplied cybercriminals with phishing kits, scam pages, and stolen credentials has been disrupted by a joint operation involving Malaysian, Australian, and U.S. authorities.  BulletProftLink, also known as a phishing-as-a-service (PhaaS) platform, had been operating for…

Enhanced EU-Ukraine cooperation in Cybersecurity

The European Union Agency for Cybersecurity (ENISA) has formalised a Working Arrangement with Ukraine counterparts focused around capacity-building, best practices exchange and boosting situational awareness. This article has been indexed from News items Read the original article: Enhanced EU-Ukraine cooperation…

Flare-On 10 Challenge Solutions

Our goal this year was to make the most difficult Flare-On challenge we’ve ever produced to celebrate a full decade of contests. At the time of this writing, there were 219 Flare-On finishers out of 4,767 registered users, which makes…

Security Is a Process, Not a Tool

Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools. This article has been indexed from Dark Reading Read the…

SaaS Vendor Risk Assessment in 3 Steps

SaaS applications are the new supply chain and, practically speaking, SaaS is the modern vendor. Here are three straightforward steps to manage this new vendor risk. This article has been indexed from Dark Reading Read the original article: SaaS Vendor…

Domain Control Validation (DCV) Methods & How to Choose

You can trust digital certificates issued by reputable Certificate Authorities (CAs) because they go through a domain control validation (DCV) process, which verifies the legitimacy of the entity requesting the SSL/TLS certificate and the domain ownership for which the certificate…