Basket of Bank Trojans Defraud Citizens of East India

Basket of Bank Trojans Defraud Citizens of East India
A series of fake banking apps are making the rounds in India, mimicking trusted institutions to steal credentials and, ultimately, ...
Read more

IT Liability Concerns – Cybersecurity Insiders

IT Liability Concerns – Cybersecurity Insiders
According to research, the number of data breaches is increasing year over year. Worse yet, for businesses, data loss may ...
Read more

Nigeria Touts Cyber Success as African Cybercrime Rises

Nigeria Touts Cyber Success as African Cybercrime Rises
Nigeria’s government has taken a tougher stance against financial fraud and cybercrime, arresting more than 1,000 people in the past ...
Read more

Giddy Up! It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind

Giddy Up! It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind
Defense Tech companies that seek to maximize their chances of winning government contracts must understand current and future cybersecurity requirements. ...
Read more

Credential Theft Becomes Cybercriminals’ Favorite Target

Credential Theft Becomes Cybercriminals’ Favorite Target
NEWS BRIEF After analyzing more than a million pieces of malware collected in 2024, researchers have found that 25% of ...
Read more

Insider Threat Program Modernization: Trends, Technologies, and Whole-Person Risk Assessment

Insider Threat Program Modernization: Trends, Technologies, and Whole-Person Risk Assessment
Insider threat management remains a top priority for organizations as insider incidents rise. Insider threats encompass a broad spectrum of ...
Read more

DNSFilter’s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests

DNSFilter’s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests
PRESS RELEASE WASHINGTON, Jan. 30, 2025 /PRNewswire/ — DNSFilter announced today the release of its 2025 Annual Security Report, showcasing an uptick in ...
Read more

Considerations while choosing a cybersecure database for Generative AI

Considerations while choosing a cybersecure database for Generative AI
As Generative AI continues to revolutionize industries by creating novel content such as text, images, and even code, it is ...
Read more

1-Click Phishing Campaign Targets High-Profile X Accounts

1-Click Phishing Campaign Targets High-Profile X Accounts
An active, one-click phishing campaign is targeting the X accounts of high-profile individuals — including journalists, political figures, and even ...
Read more

New Research from Incogni Ranks Top 238 AI-Powered Google Chrome Extensions by Privacy Risk

New Research from Incogni Ranks Top 238 AI-Powered Google Chrome Extensions by Privacy Risk
41% Collect Sensitive Data Ranging from Credit Card Info to Passwords, Putting Tens of Millions at Risk of Identity Theft Incogni, ...
Read more