Category: HelpnetSecurity

17
Apr
2023

AI verification systems give businesses an edge over scammers

Fraudsters are underestimating the power of AI to detect fake IDs, according to a new report from Ondato. Based on…

17
Apr
2023

AI tools like ChatGPT expected to fuel BEC attacks

Across all BEC attacks seen over the past year, 57% relied on language as the main attack vector to get…

16
Apr
2023

Week in review: Microsoft patches zero-day, Apple security updates, HashiCorp Vault vulnerability

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Making risk-based decisions in a…

14
Apr
2023

WhatsApp announces features to prevent account takeover

WhatsApp will be rolling out three new security features in the coming months, to provide users with increased privacy and…

14
Apr
2023

Zelle users targeted with social engineering tricks

Cybercriminals have been leveraging social engineering techniques to impersonate the popular US-based digital payments network Zelle and steal money from…

14
Apr
2023

New infosec products of the week: April 14, 2023

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Binarly, Cynalytica, GitGuardian, Netskope,…

14
Apr
2023

Organizations face an uphill battle to keep their sensitive data secure

On average, organizations store 61% of their sensitive data in the cloud, and most have experienced at least one cybersecurity…

14
Apr
2023

Conquering modern data stack complexities

How are data teams conquering the complexity of the modern data stack? Unravel Data has asked 350+ data scientists, engineers,…

13
Apr
2023

Google delivers secure open source software packages

Google has announced the Google Cloud Assured Open Source Software (Assured OSS) service, which aims to be a trusted source…

13
Apr
2023

LinkedIn now allows you to verify your workplace

To combat the surge of fake LinkedIn accounts in recent years, Microsoft has introduced Entra Verified ID, a new feature…

13
Apr
2023

The new weakest link in the cybersecurity chain

It used to be that people were the greatest cybersecurity vulnerability, but this is no longer true. The rise of…

13
Apr
2023

Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent

Wazuh launched Wazuh 4.4, the latest version of its open source security platform. The latest version adds multiple new features,…