ChatGPT Emerges as Key AI Tech for Security Vendors Jan 20, 2023 ChatGPT, a large language model (LLM) developed by OpenAI. Security Vendors integrated GPT3 into to enhance remediation information customers for…
Hackers Use HTML Smuggling To Distribute Malware by E-mail Jul 28, 2021 Another latest spam E-mail operation found, named “HTML smuggling” to circumvent E-mail security measures and transmit malware on users’ devices.
5 safety tips to follow while making digital payment transactions Apr 25, 2021 Online payments given the increased cases of cybersecurity breaches. Here are 5 tips to ensure secure digital payment transactions.
How AI, Machine Learning, and Endpoint Security Overlap Apr 17, 2021 Endpoint security is the process of securing a network’s endpoints, such as user devices and online accounts. Endpoints are entryways to the network,…
11 Useful Security Tips for Securing Your AWS Environment Apr 7, 2021 Want to take advantage of excellent cloud services? Amazon Web Services may be the perfect solution. Read on to learn some important AWS security…
5 Great Tips To Learn How To Protect From Ransomware Apr 1, 2021 In this article you will learn 5 great tips to protect from ransomware in your business and personal computers. Lets get started.
Singapore tightens cyber defence guidelines for financial services sector Jan 18, 2021 Singapore has revised its current set of guidelines on technology risk management for financial institutions to include, amongst others, “strong…
Cyber criminals started indexing the dark web Dec 22, 2020 New research has discovered smart dark web indexing service called QUO full-text search engine designed to create a continuously updated index.
2-Factor Authentication Bypass Reported in cPanel & WHM Nov 25, 2020 cPanel & WHM security vulnerability that allowed remote attackers with access to valid credentials to bypass 2-factor authentication (2FA)…
Spike in Emotet activity could mean big payday for ransomware gangs Nov 5, 2020 There’s been a massive increase in Emotet attacks and cyber criminals take advantage of machines compromised by the malware as to launch more…