Please turn on your JavaScript for this page to function normally.
US Department of Justice
U.S. authorities disrupt Russian intelligence’s botnet

In January 2024, an operation dismantled a network of hundreds of SOHO routers controlled by GRU Military Unit 26165, also known as APT 28, Sofacy Group, Forest Blizzard, Pawn …

DMARC
Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge

The essence of cybersecurity is not just about defense but enabling business through trust and reliability. As Gmail and Yahoo take steps to enforce stricter email …

New infosec products of the week
New infosec products of the week: February 16, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Center for Internet Security, Cyberhaven, LOKKER, Sumsub, and CompliancePro …

smart building
Physical security is becoming a top priority in building design

Despite the importance of security, it was, until recently, an afterthought in building design, according to Brivo. Rather than considering security from the very beginning, …

elections
Cyber threats cast shadow over 2024 elections

Considering that 2024 is a historic year for elections – with an estimated half of the world’s population taking part in democratic votes – this high threat of cyber …

Varta
Battery maker Varta halts production after cyberattack

German battery manufacturer Varta was forced to shut down its IT systems and stop production as a result of a cyberattack. The Varta cyberattack The cyberattack occurred on …

face
iOS users beware: GoldPickaxe trojan steals your facial data

Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s …

brain
AI outsourcing: A strategic guide to managing third-party risks

In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this …

free digital forensics tools
5 free digital forensics tools to boost your investigations

Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it’s a key component of incident response. Additionally, digital forensics provides …

malware
Understanding the tactics of stealthy hunter-killer malware

Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise …

computer
AI PC shipments are expected to surpass 167 million units by 2027

Shipments of AI PCs – personal computers with specific system-on-a-chip (SoC) capabilities designed to run generative AI tasks locally – are expected to grow from nearly 50 …

AI
How are state-sponsored threat actors leveraging AI?

Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations. Threat actors …

Don't miss

Cybersecurity news