The Frontier of Security: Safeguarding Non-Human Identities

The Frontier of Security: Safeguarding Non-Human Identities

Dropbox, Microsoft, Okta – not only are these all major software companies, but each of them has fallen victim to a supply chain attack due to a compromised non-human identity. For decades the security industry has prioritized protecting human identities, but with the influx of Gen-AI tools and increase in automation, new identities have emerged, opening up an entirely new attack surface: non-human identities (NHIs). As NHIs continue to be the focus of exploitation, organizations…

Read More

The Cybersecurity Checklist: Top Methods and Tools for Protection And Mitigation

The Cybersecurity Checklist: Top Methods and Tools for Protection And Mitigation

The rapid development of artificial intelligence (AI) is fueling an increase in cyber-attacks, threatening the data infrastructure of businesses and individuals. Approximately 85 percent of cybersecurity professionals attribute the increase in cyber-attacks to bad actors using generative AI. No sector is safe. From denial-of-service (DoS) to advanced phishing to deep fakes, businesses and organizations must prepare for AI-driven cyber-attacks, and an integrated set of tools and security measures is necessary to protect their data. Most…

Read More

Modernizing bp’s application landscape with AI

Modernizing bp’s application landscape with AI

One of the oldest and largest oil and gas companies in the world, bp is in the midst of a major transition as it pivots toward becoming an integrated energy company. As part of this transition, the company is aiming for a net-zero carbon footprint by 2050. The scope of its efforts so far is demonstrated by its shift into lower-carbon businesses, power trading, and convenience stores, which represented just 3% of its investment in…

Read More

The Age of Unseen Truths And Deceptive Lies

The Age of Unseen Truths And Deceptive Lies

From the moment we’re born, we are surrounded by a mix of true and false information. In the past, distinguishing between them was relatively easy, but over time, it has become increasingly difficult. The advent of generative AI technologies has ushered in a new era of entertainment, solutions, and, unfortunately, a new level of “fakeness.” Today, texts, images, and videos can be created entirely from scratch or manipulated to the point where it’s nearly impossible…

Read More

AWS Announces £5m Grant for Cyber Education in the UK

AWS Announces £5m Grant for Cyber Education in the UK

Amazon’s cloud branch, Amazon Web Services (AWS), is launching a £5m ($6.2m) grant to help strengthen the cybersecurity capabilities of educational institutions across the UK. According to a January 24 announcement, the AWS UK Cyber Education Grant Program aims to enhance security capabilities in UK educational institutions, advance ransomware protection, upskill the IT workforce in key cybersecurity areas and provide immediate incident response support when necessary. As part of this initiative, AWS will offer: Credits…

Read More

Building cybersecurity trust: Why public awareness campaigns are vital

Building cybersecurity trust: Why public awareness campaigns are vital

Trust forms the foundation of cybersecurity. From banking transactions to social media, we constantly share sensitive personal information online. While the internet provides convenience and connectivity, many users remain uneasy about digital security. Public awareness campaigns play a key role in building trust, correcting misconceptions and providing clear action steps for both individuals and organizations. Cybersecurity extends beyond IT departments and corporations, it requires attention from everyone who uses the internet. As cyber threats grow…

Read More

Tagged Files as a Road to Insider Threats

Tagged Files as a Road to Insider Threats

The insider threat is any individual within community who does something against such surrounding even being used for sabotage, diversion, espionage and the other purposes, so far. On the other hand, the business environment cannot be yet assured completely as those relying on, say, a corporate security deal with relatively questionable effective and still quite expensive defense opportunity that might demonstrate both – some pluses and minuses at the same glance. Indeed, the corporate security…

Read More

Russian Scammers Target Crypto Influencers with Infostealers

Russian Scammers Target Crypto Influencers with Infostealers

A new report by Recorded Future has revealed new elements about the sophisticated techniques by which a well-known Russian crypto scamming group operates. The group, Crazy Evil, is a collective of social engineering specialists tasked with redirecting legitimate traffic to malicious landing pages – commonly called a ‘traffer team.’ Since 2021, the group has been targeting cryptocurrencies, non-fungible tokens (NFTs), smart contracts, and other web3 projects to conduct malicious activity on social media. This activity…

Read More

El Hospital Sant Joan de Déu mejora la atención al paciente a través de un nuevo modelo de gestión de datos

El Hospital Sant Joan de Déu mejora la atención al paciente a través de un nuevo modelo de gestión de datos

El Hospital Sant Joan de Déu ha recurrido a la tecnología de Denodo para gestionar, explotar y analizar de manera rápida, efectiva y de forma ética los datos del centro. El propósito no es otro que dar un paso adelante en la mejora de la atención y el diagnóstico de sus pacientes. En concreto, el hospital, uno de los centros maternoinfantiles de alta especialización y centro de referencia internacional, ha desplegado Denodo Platform en el…

Read More

North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns

North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns

The FBI has warned that North Korean IT worker schemes are stealing data to extort their victims as part of efforts to generate revenue for the Democratic People’s Republic of Korea (DPRK). The US intelligence agency confirmed it has observed North Korean IT workers engaging in this tactic over recent months. This involves exfiltrating stolen proprietary data and code from their former employers. This information is then held “hostage” until the ransom demand is met….

Read More
1 2 3 2,568