FBI Warns Smart Home Users of Badbox 2.0 Botnet Threat

FBI Warns Smart Home Users of Badbox 2.0 Botnet Threat

The FBI has urged smart home users to look out for indicators of compromise (IoCs) in their connected devices after releasing a security alert about the Badbox 2.0 botnet. In a Public Service Announcement (PSA), the law enforcement agency claimed that threat actors either install malware to the devices prior to purchase, or via “required applications” containing backdoors that must be downloaded during setup. It said that affected devices, made mainly in China, include TV…

Read More

Expanding on ADHICS v2.0: A Closer Look at Healthcare Cybersecurity in the UAE

Expanding on ADHICS v2.0: A Closer Look at Healthcare Cybersecurity in the UAE

As digital transformation sweeps across the healthcare sector, there has never been more at stake. Healthcare data is worth a lot on the black market. Unlike financial data, which has a short shelf life (accounts can be frozen, and fraud alerts issued), medical records stay fresh for a long time. They contain a host of personal information, like medical histories, insurance data, and payment information, which malefactors can use to steal identities, commit insurance fraud, or…

Read More

“통제 밖으로 번지는 생성형 AI··· CISO 대응 한계 드러나” 팔로알토네트웍스 조사

“통제 밖으로 번지는 생성형 AI··· CISO 대응 한계 드러나” 팔로알토네트웍스 조사

그는 “생성형 AI 앱이 조직에 심각한 문제를 일으킬 수 있는 방식으로 다량 사용되고 있는 것은 명백한 사실”이라며 “회사 통제 밖의 개인 컴퓨터로 생성형AI를 사용할 경우, 단순한 질문을 통해서도 대량의 데이터가 유출될 수 있다. 문제는 질문뿐만 아니라 다른 사용자의 질문 패턴도 AI가 학습하기 때문”이라고 설명했다. 이어 “이는 조직이 완전히 통제하기 어렵다. 누구나 개인 시간에, 개인 기기에서 AI를 사용할 수 있기 때문”이라고 덧붙였다. 조직이 의도하든 아니든 승인되지 않은 생성형AI 앱을 사용하는 직원을 오히려 보상하는 경우도 있다고 그는…

Read More

오디오에서 추론→음성 생성→실시간 소통···구글, “대화가 AI와 소통하는 핵심적인 방법될 것”

오디오에서 추론→음성 생성→실시간 소통···구글, “대화가 AI와 소통하는 핵심적인 방법될 것”

구글이 제미나이에서 제공하는 오디오 기능은 단순한 음성 합성이나 인식의 단계가 아니라 인간과 AI가 실시간으로 소통하는 가장 중요한 방법이 될 것이라고 밝혔다. 구글 I/O 2025에서 쏟아냈던 다양한 AI 서비스와 기능 중에 하나였던 AI 기반 오디오 대화 및 생성에 대한 좀 더 자세한 설명을 블로그를 통해 3일 공개했다. 제미나이 2.5 플래시 프리뷰(Gemini 2.5 Flash preview)에서 제공하는 기본적인 오디오 대화(native audio dialog) 기능은 실제 사람과 이야기하는 것처럼 자연스러운 대화(Natural conversation)가 핵심이다. 말할 때의 리듬, 웃음, 어조, 짧은 지연…

Read More

AI의 ROI : 과대포장보다 실질적인 효과가 중요한 이유

AI의 ROI : 과대포장보다 실질적인 효과가 중요한 이유

“AI가 무엇을 할 수 있는지를 먼저 고민하지 말고, 비즈니스가 더 잘하려면 무엇이 필요한지를 먼저 고민하라.” AI를 도입한 수많은 조직과 긴밀히 협업하면서 배운 가장 중요한 교훈을 잘 요약한 말이다. 생성형 AI나 에이전트 기반 모델의 최신 성과에 언론은 열광하지만, 경영진이 진짜로 던져야 할 질문은 “이 기술이 우리에게 가장 중요한 비즈니스 과제를 해결하는 데 어떤 도움이 되는가?”이다. AI는 이제 분수령을 맞이하고 있다. 더 이상 혁신 연구소나 개념 증명 단계에 머물지 않고 모든 산업의 운영, 제품, 고객 경험에 실제로…

Read More

How To Strengthen the Security of Your Symfony-Based Solution

How To Strengthen the Security of Your Symfony-Based Solution

Like all web-based solutions, applications built with Symfony are exposed to various cyber threats, and you should be ready to address them to make your website or app secure. After all, if hackers are able to gain access to your corporate and user data through your Symfony solution, you risk losing business reputation, which is extremely challenging to recover. In this article, Symfony experts from Itransition highlight the common security threats for Symfony-based solutions and provide three…

Read More

How to Stop Infostealers and Next-Gen Ransomware with an Identity-Centric Security Approach

How to Stop Infostealers and Next-Gen Ransomware with an Identity-Centric Security Approach

Ransomware is the leading cybersecurity threat across every industry and a top priority for every Security Operations Center (SOC) team according to the SpyCloud 2024 Malware and Ransomware Defense Report. When focusing on mitigating ransomware risk, it’s important not to overlook the growing threat of infostealer malware (“infostealers”) – an often quiet precursor to ransomware attacks. Our research has revealed that one-third of companies who fall victim to ransomware have experienced at least one infostealer infection…

Read More

How To Leverage Cloud Analytics to Detect and Prevent Cybersecurity Threats in Real-Time

How To Leverage Cloud Analytics to Detect and Prevent Cybersecurity Threats in Real-Time

Today, cloud environments are more complex than ever. Organizations are navigating multicloud, multi-tenant, multi-national, and multi-business unit landscapes. On top of this, the speed of fluctuation in usage and cloud consumption adds another layer of complexity. This increases an organization’s attack surface, leaving it more vulnerable to cyber-attacks and data breaches that can cost business millions of dollars. Microsoft Azure gave some interesting insights at the start of 2025. The cloud computing platform reported that…

Read More

Control content chaos without compromising security

Control content chaos without compromising security

You’ve heard the argument: We needed the sales presentation immediately and marketing couldn’t turn it around quick enough, so we pulled a few images from the web, generated some AI copy and put our logo on it. Repeat this same scenario but replace the marketer with the HR teammate who needed a training guide or the regional event manager who developed materials on the fly for a show. All good-intentioned, but did the unauthorized tools…

Read More

Scattered Spider Uses Tech Vendor Impersonation to Target Helpdesks

Scattered Spider Uses Tech Vendor Impersonation to Target Helpdesks

Scattered Spider, the ransomware collective believed to be behind recent retail hacks in the UK, including those targeting Marks & Spencer (M&S) and Harrods, has evolved its arsenal to incorporate more sophisticated tactics. In a new report published on June 5, ReliaQuest said, “what started as a run-of-the-mill SIM-swapping crew has morphed into a global threat, armed with advanced social engineering skills and relentless ambition.” The cybersecurity company analyzed a publicly sourced dataset comprising over…

Read More
1 9 10 11 12 13 2,808