Browsing Category
Cybersecurity
AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from…
By Tim Ward, Chief Strategy Officer, XConnect
Robocalls are relentlessly targeting consumers and causing mistrust for the telecom…
Ukraine Claims it Hacked Russian MoD
Hackers operating from Ukraine’s Main Intelligence Directorate (GUR) have claimed another scalp; the Russian Ministry of Defense…
TeamCity Users Urged to Patch Critical Vulnerabilities
Software developer JetBrains has warned users of its popular TeamCity CI/CD tool that they should prioritize patching of two new…
Self-Propagating Worm Created to Target Generative AI Systems
Researchers have developed a computer worm that targets generative AI (GenAI) applications to potentially spread malware and steal…
Hacktivist Collective NoName057(16) Strikes European Targets
The cyber threat actor known as NoName057(16) has been observed changing tactics amid the escalating conflict between Ukraine and…
TA577 Exploits NTLM Authentication Vulnerability
Cybersecurity researchers at Proofpoint have uncovered a new tactic employed by cybercriminal threat actor TA577, shedding light…
Predator Spyware Targeted Mobile Phones in New Countries
The Predator spyware, at the heart of the Predator Files affair in 2023, is still used in…
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security
By Aimei Wei, Chief Technical Officer and…
2024 Predictions: The Rise of AI Brings New Security Challenges
By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray
The emergence of generative AI has put…
Securing Perimeter Products Must Be a Priority, Says NCSC
UK cybersecurity experts have warned that threat actors are increasingly targeting insecure self-hosted products at the corporate…