• 04 de diciembre de 2024
    How can misconfigurations help threat actors abuse AI to launch hard-to-detect attacks with massive impact? We reveal how AI models stored in exposed container registries could be tampered with— and how organizations can protect their systems.
  • 28 de noviembre de 2024
    This analysis investigates the security risks of eKYC systems in relation to deepfake attacks, highlighting the diverse strategies employed by cybercriminals in bypassing eKYC security measures.
  • 20 de noviembre de 2024
    Consumer data will be the hot commodity in the underground for 2025, with cybercrime expected to cost over $10 trillion in this coming year. Criminals will continue to develop new ways to exploit vulnerable areas, increasing enterprise risk as the attack surface expands.
  • 31 de octubre de 2024
    Cellular IoT vulnerabilities show an increasing trend over the years, indicating that these devices are becoming more and more popular — and that they are being targeted more frequently.
  • 29 de octubre de 2024
    INC ransomware was first detected in July 2023, but has already released new versions: one that targets Linux computers and an update on their Windows variant. The ransomware has been observed to exploit CVE-2023-3519 and uses HackTool.Win32.ProcTerminator.A for defense evasion and HackTool.PS1.VeeamCreds for credential access in its different attack chains.
  • 28 de octubre de 2024
    Quantum machine learning (QML) is at the nexus of two very hyped topics: artificial intelligence and quantum computing. Ignoring the AI hype, let's explore how realistic quantum machine learning is.
  • 25 de octubre de 2024
    Blockchain technology continues to be widely adopted by enterprises for its numerous benefits, and it has inevitably attracted the attention of malicious actors. The secure, decentralized nature of blockchain does present a challenge to cybercriminals, yet it is not immune to attacks.
  • 24 de octubre de 2024
    Elections are not just an opportunity for nation states to use Generative AI tools to damage a politician’s reputation. They are also an opportunity for cybercriminals to use Generative AI tools to orchestrate social engineering scams.
  • 18 de octubre de 2024
    Enterprises have been steadily adopting private blockchains, placing this technology in different areas of their operations. When deployed as private permissioned networks, Ethereum-based blockchains and other similar decentralized ledger technologies are beneficial for enterprises. The advantages of integrating private blockchains into organizational processes can be substantial and multifaceted.