Cybersecurity News

AI Takes Center Stage in Cybersecurity at Gartner Summit 2025 Day 2

AI Takes Center Stage in Cybersecurity at Gartner Summit 2025 Day 2

MUMBAI, India – Day 2 at the Gartner Security and Risk Management Summit in Mumbai discussed insights on AI’s impact on cybersecurity, with analysts discussing securing AI apps and improving cyber resilience in 2025.  “Assess current CTI program and processes to identify areas where AI can enhance operations, aiming to automate 25% of manual work done in the CTI lifecycle by the end of the year. Use AI processing to analyze CTI inputs to assign criticality, risk, and prioritization. This will reduce false positives, investigation time, and address some CTI skills gaps,” said Steve Santos, Sr Director Analyst at Gartner, […]

australia cyber threats

Australia’s Fight Against Cyber Threats in a Digital Age

Australia has embarked on significant steps to enhance cybersecurity as cyber threats evolve posing greater risk to the country with proliferation of new innovations such as AI, generative platforms. As these advancements introduce the improvements, they create the doors to the negative actions including the intricate scams which involve the AI tools manipulating the audio, video, and the images that are clearly fake. Cybercrime also have huge financial cost with victim’s average loss of AU$30,700 per incident. This risk is even much higher especially during the holiday season, or even worse targeting especially the young people in the millennial and […]

seqrite automates cybersecurity with aws

Seqrite Boosts Cybersecurity with Predictive Analytics on AWS

Seqrite, the enterprise arm of Quick Heal Technologies Limited, has risen to the top of the cybersecurity space by embracing technological solutions. Praised for its innovative solutions for endpoints, networks, and data protection, Seqrite has expanded its portfolio in the cybersecurity sphere by becoming an AWS partner. It has also provided Seqrite with the chance to create new solutions based on artificial intelligence to combat contemporary threats that organizations are experiencing globally. The organization operates in a world where cyber threats are evolving, and as such, Seqrite has achieved tremendous progress in improving the efficacy of its services. AWS has […]

LG Strengthens Cybersecurity for Software-Defined Vehicles

LG Strengthens Cybersecurity for Software-Defined Vehicles

SEOUL, Dec. 3, 2024 – Level 3 Cybersecurity Management Systems (CSMS) certification from TÜV Rheinland leaves little doubt that LG Electronics (LG) is one of the top players in automotive cyber security. The certificate, highest of its kind under the present standards, proves that LG has a really holistic approach to security for its automotive products throughout the development, manufacturing, and application stages. This accomplishment speaks to the adherence of these two international standards, the ISO/SAE 21434 and the UN R155 regulation, which are mandatory for automakers in 56 countries. The two-pronged evaluation process involved simulated cyberattacks to find vulnerabilities […]

Amazon GuardDuty Extended Threat Detection

Amazon Enhances Cloud Security with GuardDuty Extended Threat Detection

December 2, 2024 –AWS has announced a major update to its cloud security offerings by introducing Amazon GuardDuty Extended Threat Detection. This innovation incorporates deep reinforcement learning of artificial intelligence (AI) and machine learning (ML) features in analyzing complicated nested attack plans as the new benchmark in the cloud’s preventive security. New and innovative methods of threats have emerged and developed over time, making the traditional threat detection approach inadequate for the ever-growing cloud environment. Amazon GuardDuty Extended Threat Detection solves this problem using AI and ML to analyze the event streams between workloads, applications, and data. This means that by […]

New Eurotech IoT Gateway Enhances Security and Simplifies Global Compliance

New Eurotech IoT Gateway Enhances Security and Simplifies Global Compliance

Amaro, Italy – November 12, 2024 – Eurotech has presented ReliaGATE 15A-14, a next-generation gateway that secures all necessary Cybersecurity and Compliance elements for the global IoT ecosystems. Being the very first cyber security-certified edge gateway in the market, the ReliaGATE 15A-14 will simplify cross-regional IoT deployment’s operational and compliance costs. This device possesses a combination of modularity and security features necessary to cater to various IoT applications and global markets without using custom hardware. By incorporating the connectivity of the cellular carrier certifications and by offering an integrative design with a global scope, ReliaGATE 15A-14 enables organizations to deploy […]

New MoU Enhances Cybersecurity in Connected Vehicles

New MoU Enhances Cybersecurity in Connected Vehicles

November 12, 2024, India-VVDN Technologies, and SecureThings.ai bolstered their positions on the market by announcing a strategic agreement. This collaboration aims to strengthen and improve protection for connected vehicles and devices through SecureThings.ai’s ability to integrate its cyber security technologies into VVDN’s automotive and IoT product range. This is a notable milestone for achieving the requirements of global regulations, including the ISO 21434 standards for cyber security in automotive. The partnership emphasizes many security goals including, real-time attack detection, threat intelligence as well as the establishment of a Security Research Lab tasked with designing security. “Cybersecurity is the utmost important […]

CrowdStrike to Bolster Cloud Security with Adaptive Shield Acquisition

CrowdStrike to Bolster Cloud Security with Adaptive Shield Acquisition

AUSTIN, Texas and Fal.Con Europe, Amsterdam – November 6, 2024 –According to a press release from CrowdStrike Holdings, Inc. (NASDAQ: CRWD) a major Acquisition is expected from CrowdStrike Holdings in the future. They are planning to acquire Adaptive Shield, which develops one of the prominent SaaS Security Solutions. This acquisition would enhance CrowdStrike’s Falcon platform by integrating cloud and Identity security features that fill security voids in hybrid ecosystems. The acquisition was announced during a user conference that CrowdStrike organized, the position of the company as of now enables them to be a single vendor with an entire end-to-end identity-based […]

Over 70% of Singaporean Firms Report Cyber Incidents in Supply Chains

Over 70% of Singaporean Firms Report Cyber Incidents in Supply Chains

SINGAPORE, November 4, 2024 – According to BlueVoyant’s report, over 70 percent of Singaporean enterprises reported that their supply chains struggled with cybersecurity attacks over the past year, indicating continued weaknesses in the face of measures taken to curtail the attack. The report noted that on average, a company suffered more than four breaches that negatively influenced business processes and drew attention to security issues that plagued the cyberspace of Singapore. In comparison, it appears that 81% of organizations from around the world that responded to a similar survey reported experiencing the same effects, making it seem that Singaporean companies […]

Supply Chain Cyber Breaches Hit 81% of Organizations, BlueVoyant Report Reveals

Supply Chain Cyber Breaches Hit 81% of Organizations, BlueVoyant Report Reveals

New York, November 4, 2024 – The fifth edition of BlueVoyant’s annual global supply chain cyber risk survey depicts a paradox of progress and continuous setbacks as 81% of organizations experienced cyber breaches in their supply chains within the last year, compared to 94% of reported breaches in the year 2023. “More organizations than any previous year indicated that their primary focus is no longer on awareness of the third-party risk management problem or adoption of a program, but rather with the operational, day-to-day challenges of managing an effective program,” said Joel Molinoff, global head of Supply Chain Defense at […]

Accenture Invests in Reality Defender to Help Fight Deepfake Extortion, Fraud and Disinformation

Accenture Backs Deepfake Detection Pioneer Amid 223% Surge in AI Threats

NEW YORK, October 22, 2024 – Accenture has made a strategic investment in Reality Defender, a move significant enough in tackling the rising concerns of deepfake fraud and misuse of artificial intelligence. Reality Defender, the winner of the RSA Innovation Award, focuses on providing real-time solutions to the threat posed by audiovisual deep fakes. This investment, which is in the form of equity financing, is intended to mitigate sophisticated artificial intelligence threats in the areas of financial services, media, and hi-tech industries. “As deepfakes become more convincing and harder to identify, organizations urgently need scalable and effective detection solutions,” Said […]

RSA Recognized For IGA Excellence And Innovation

RSA Maintains Its Dominance In IGA With Another Award

Burlington, Massachusetts, United States – 17th October 2024 – KuppingerCole analysts name RSA Governance & Lifecycle an Overall, Product, Market and Innovation Leader in its 2024 Identity Governance and Administration (IGA) Leadership Compass Report. The achievement marks the sixth year in a row RSA has received this recognition. RSA announced the achievement with a post on X: 📢NEWS: For the sixth consecutive year, RSA is a @kuppingercole #IGA leader. See our #pressrelease for more on the advanced dashboards, analytics-driven risk engine, and wide support that provide the #access visibility organizations need ⬇️https://t.co/1eVkQanCyH pic.twitter.com/CFNfhQvfDx — RSA (@RSAsecurity) October 17, 2024 The […]

iProov Strengthens AI-powered Identity Verification Amid Fraud Spike

iProov Strengthens AI-powered Identity Verification Amid Fraud Spike

London, UK — October 17, 2024-iProov, a pioneer in the field of biometric identity solutions, has unveiled a 63% increase in transactions from August 2023 to August 2024, which can be attributed to the rising popularity of cloud-based onboarding and authentication services. Given that the world of finances is gradually becoming more digitized, which brings security challenges, iProov has established a strong client base across several sectors, including financial services, government, telecom, as well as education. One of the growth’s benefits is the overwhelming popularity of generative AI, which has greatly elevated the presence of threats, especially deepfakes. “As one […]

Covered California Enhances AI Security with Google and Deloitte Partnership

Covered California Enhances Security with Google and Deloitte Partnership

WASHINGTON and SACRAMENTO, Calif., Oct. 16, 2024-Through its agreement with Google Public Sector and Deloitte, Covered California illustrates the increasing role of AI in cybersecurity within public systems, especially in safeguarding information in health systems. Using Google Security Operations, the organization optimizes its capability to combat and respond to cyber threats in a timely manner. Thanks to Gemini AI, the system is able not just to conduct but in addition create and execute threat searches, summarize results, and recommend fixes, all of which contribute to decreasing the length of time in response to incidents. The cooperation aims to strengthen the […]

Acronis, IONOS Reshape Security With Cyber Cloud Data Center

Acronis Opens Cyber Cloud Data Center In Berlin With IONOS

Berlin, Germany – 16th October 2024 – Leading cybersecurity firm Acronis has teamed up with IONOS, a leading digitalization provider for European SMBs, to launch a new Cyber Cloud data center in Berlin, Germany. The facility offers enterprises improved disaster recovery, data access and data sovereignty by fusing cloud architecture with cutting-edge cyber security solutions. Combined with IONOS’ Frankfurt facility, the Berlin-based Cyber Cloud data center delivers geo-redundant storage and conforms with the strictest security and regulatory requirements. Moreover, it’s backed by ISO standards and robust SLAs from top cybersecurity providers. The addition of the new data center to Acronis’ […]

Zscaler Report Over 200 Malicious Apps on Google Play Store Affect 8 Million Devices

Zscaler Report: Over 200 Malicious Apps on Google Play Store Affect 8 Million Devices

San Jose, California, -15 October 2024 — Zscaler’s 2024 Mobile, IoT, and OT Threat Report exposits the grave threats in cybersecurity plaguing the different industries including more than 200 malicious apps present on Google Play Store and distributed over 8 million installs. It is an alarming number that comes off the back of a 111% growth of spyware and a 29% growth of banking malware called the rapid evolution of threats against mobile and IoT devices. “Cybercriminals are increasingly targeting legacy exposed assets which often act as a beachhead to IoT & OT environments, resulting in data breaches and ransomware […]

Cryptographic Agility Key For Future Cybersecurity Glen Leonhard

Help Net Security Interview: Cryptographic Agility Key In Post-Quantum Era

In a recent interview with Help Net Security, an independent cybersecurity publication, Glen Leonhard, Director of Key Management at Cryptomathic, discussed the potential of cryptographic agility. The term refers to the concept of businesses transitioning to post-quantum cryptographic algorithms without disrupting existing systems. With long-term cybersecurity in the spotlight, especially with the growing quantum computing threat, the interview dives into cryptographic agility, the role of quantum computing and how businesses can adapt to new vulnerabilities and regulations. Help Net Security announced the interview with a post on X: Unlocking the power of cryptographic agility in a quantum world – https://t.co/fW6oiG8Jnc […]

Samsung Strengthens Security in AI-Powered Home Devices

Samsung Strengthens Security in AI-Powered Home Devices

Seoul, October 11, 2024 – Samsung Electronics announced new improvements in the protection of AI home appliances as part of the marketing of the Knox Matrix platform. Once confined to gadgets like smartphones and TVs, Knox Matrix will now include the protection of AI-based home appliances such as refrigerators and laundry machines. The purpose of the upgrade is to meet the rising demand for the security of the devices by interlinking all the devices within the network so that each device is capable of watching over the others for possible attacks. This next level of security will also include biometric […]

Infinigate Iberia, WithSecure Expand Collaboration On Cybersecurity Portfolio

Infinigate, WithSecure To Boost Cybersecurity In Iberia

Madrid, Spain – 10th October 2024 – Infinigate Group announces it will expand its strategic partnership with WithSecure into the Iberian Peninsula. The cybersecurity, cloud and network infrastructure advisor will leverage WithSecure’s cloud-based security solutions to deliver leading-edge protection to its partners and clients. The move follows successful expansions in France and Belgium, as both businesses look to further strengthen their strategic alliance. Infinigate’s clients in Iberia will soon be able to secure their critical enterprise assets with WithSecure’s innovative cloud-based security solutions. The expansion aims to deliver comprehensive cybersecurity solutions to Infinigate’s partners as cyber threats become increasingly complex. […]

HUMAN Raises $50+ Million in Growth Funding to Protect the Digital Customer Journey and Defend Against Bots, Fraud and Risk

HUMAN Secures $50M to Boost AI Cybersecurity Defense Platform

NEW YORK (October 9, 2024) – HUMAN Security, Inc., known for its pioneering in cybersecurity, has recently secured $50 million in growth funding. The latest financing round was organized by WestCap, capital market firms Zigzag’s advanced contributions from Goldman Sachs, ClearSky, NightDragon, and Vertex Ventures. These funds are intended to increase the strengths of the HUMAN’s Human Defense Platform, which now processes 20 trillion digital interactions on an average every week, ensuring companies and consumers are protected from bots, fraud, and other forms of digital threats. HUMAN has presented its technology for obvious defense since its establishment in the year […]

Tata Communications, Palo Alto Networks To Boost Enterprise Cybersecurity

Tata Communications, Palo Alto Networks To Boost Enterprise Cybersecurity

Mumbai, India – 8th October 2024 – Tata Communications and Palo Alto Networks announce a partnership to deliver integrated cybersecurity solutions to boost global enterprise cyber resilience. By combining Palo Alto’s AI-driven threat detection with Tata’s managed consulting services, the collaboration aims to enhance security efficiency for modern businesses navigating the challenges of the evolving cyber threat landscape. Palo Alto AI Networks joins digital transformation services provider Tata Communications in a strategic alliance aimed at providing comprehensive cybersecurity solutions to global enterprises. With businesses increasingly adopting AI, cloud computing and remote work arrangements, the partnership aims to deliver robust cyber […]

EU Court Ruling Redefines Facebook’s Data Collection Practices

Facebook’s Targeted Advertising Faces New Restrictions Under EU Ruling

Brussels, Belgium-October 4, 2024-A recent European Court ruling has imposed new limits on Facebook’s use of personal data for targeted advertising. However, the court did rule that the social media company could not process the users’ data indiscriminately – without ‘time-frames’ or different data types – due to reasons of privacy and user consent. The aforementioned ruling had to do with a complaint filed by NOYB (None of Your Business), an organization headed by Max Schrems. The court found out that Facebook’s sweeping collection and exploitation of individual’s information without their consent was unlawful under the EU Charter on Data […]

Webroot Report Highlights Growing AI Privacy Concerns In 2024

Webroot Report Highlights Growing AI Privacy Concerns In 2024

Waterloo, Ontario – 3rd October 2024 – OpenText’s Webroot 2024 GenAI Consumer Trends And Privacy Research reveals that while 39% of Americans use generative AI at least once a week, privacy concerns remain high, especially among parents. With only 27% professionals securing workplace data while leveraging Gen AI, the report highlights a significant risk of AI systems collecting private data. According to OpenText’s Webroot 2024 GenAI Consumer Trends and Privacy Report, there are growing concerns about privacy, particularly among parents, as Gen AI adoption and applications proliferate. Even though many people prioritize protecting their personal data, only 27% of respondents […]

AI Fueling New Cyber Attacks Egress Phishing Trends Report 2024

Phishing Emails Surged By 28% In 2024: Egress Report

London, UK – 3rd October 2024 – The 2024 Phishing Threat Trends Report by Egress, a renowned cybersecurity business and subsidiary of software firm KnowBe4, highlights notable changes in phishing strategies. The research shows a 28% increase in phishing emails between Q1 vs Q2 2024. Moreover, 74.8% of phishing toolkits mention artificial intelligence as a key driver, while an alarming 82% of them mention deep fakes.  The report emphasizes that cybersecurity teams globally are being overrun by commodity phishing assaults, which are powered by mass impersonation, having increased by 2,700%. The report found that hyperlinks make up the majority of […]

Northern Trust Survey Reveals AI and Cybersecurity Concerns Amid Digital Asset Adoption by Investors

Northern Trust Highlights AI, Cybersecurity Risks in Digital Asset Adoption

London-27th September 2024 – Institutional investors are increasingly embracing digital assets while navigating rising cyber and AI threats, according to insights from Northern Trust’s Tech Horizons symposium. The survey also reveals a strong belief in AI’s potential to optimize and enhance digital portfolios, tackling concerns over rising Cybersecurity risks. With an ever-evolving data landscape, institutional investors are looking to strike a balance between their excitement for new technologies and their worries about the growing threats posed by AI-powered cyber threats. These observations come from the Tech Horizons: Exploring the Future of Innovation conference, which Northern Trust recently conducted in London.  […]

Red Canary and Palo Alto Networks Launch Managed Security Services for Cortex XSIAM

Red Canary and Palo Alto Networks Launch Managed Security Services for Cortex XSIAM

Denver, CO, September 26, 2024 – Red Canary announced its intention to expand its relationship with Palo Alto Networks by offering additional managed security services for the Cortex XSIAM platform. Through this partnership, it is envisioned that organizations will be able to detect more complex cyber-attacks than before, with security operations also becoming more efficient. These new managed security services are expected to combine Red Canary’s strength of managed detection and response (MDR) with the security technology solutions of Palo Alto Networks. Thus, the establishment of the partnership is expected to enhance the overall performance of organizations in fighting cybersecurity […]

Ericsson Partners with INFORM to Strengthen Financial Security and Combat Fraud

Ericsson Partners with INFORM to Strengthen Financial Security and Combat Fraud

Stockholm, Sweden – September 2024 – Ericsson has announced a huge collaboration with INFORM who are experts in risk management systems based on artificial intelligence to enhance financial security in the world.  In particular, the partnership will incorporate the crazily multiplying Ericsson Mobile Financial Services (MFS) platform with INFOR’s RiskShield solution enabling advanced detection and mitigation of fraud, money laundering, and other financial crimes. The foremost objective of this partnership is to provide an effective means for banks, fintechs, and communication service providers against the increasing financial crime. The RiskShield solution from informal comes with advanced AI as well as […]

TRG And Inversion6 Join Forces Amidst Plans For Global Expansion

TRG Acquires Cybersecurity Division Inversion6, Targets 20% Organic Customer Growth

Global managed services provider TRG announces its merger with sister company Inversion6 to boost its cybersecurity capabilities. Stakeholders said that “cybersecurity” was a necessary discussion in each meeting, and that the strategic merger would enable TRG’s customer base to directly access Inversion6’s cybersecurity team. TRG expects a 20% growth in its organic customer base post-merger, which aligns with its near-future plans to onboard workers overseas to globalize its presence. Can the combined entity take on cybersecurity leaders with its comprehensive security offerings? TRG, a privately-owned managed IT service provider has merged with its sister company, Inversion6, to augment its core […]

EC-Council AI-Powered Ethical Hackers

Can EC-Council’s CEH V13 Leverage AI To Revolutionize Ethical Hacking?

The integration of Artificial Intelligence into the Certified Ethical Hacker (CEH) v13 curriculum by EC-Council marks a significant leap, enabling cybersecurity professionals to upskill themselves to combat evolving cyber threats more efficiently. Considered the top ethical hacking certification in the world, the move aims to educate and equip participants with in-demand AI skills. The CEH v13 program emphasizes hands-on learning with 40 hours of training and year-long competitions spanning 550 attack techniques, imparting advanced skills to help participants defend their businesses against AI-driven cyberattacks. Pioneering cybersecurity education and training services leader, EC-Council, has introduced a ground-breaking change to its Certified […]

Bitdefender PHASR

Cybersecurity Leader Bitdefender Launches Industry-First PHASR Technology

Cybersecurity leader Bitdefender announces its Proactive Hardening and Attack Surface Reduction technology, or PHASR for short, aimed at dynamically aligning cybersecurity strategies with changing user behaviors. The technology aims to improve security posture, harden enterprise environments and reduce security incidents.  Bitdefender’s GravityZone PHASR solution offers businesses tailored security policies based on individual and group behavior, helping IT security teams align their broader user privileges strategies based on role-based behaviors. This is expected to reduce potential vulnerabilities and give IT teams more visibility into security incidents. Bitdefender, a popular name in the cybersecurity industry, announced its new technology, GravityZone Proactive Hardening […]

Nader Zaveri Leads Google Cloud's IR Strategy at mWise 2024

Nader Zaveri Leads Google Cloud’s IR Strategy at mWise 2024

Nader Zaveri led a compelling discussion on Google Cloud’s incident response and remediation strategies at mWise Conference 2024. Highlighting the critical role Mandiant plays in fortifying Google Cloud’s defenses, Zaveri focused on proactive threat mitigation and the advanced solutions that help enterprises respond swiftly to security incidents. His appearance on theCUBE, alongside John Furrier and Savannah Peterson, shed light on how Google Cloud is setting new standards for cybersecurity in a rapidly evolving threat landscape. In a recent interview at  mWise Conference, Nader Zaveri from Google Cloud presented intensively on the techniques of incident response (IR) and containment in times […]

Cside Funding Secures $6 Million to Revolutionize Cybersecurity Landscape

C/side Funding Secures $6 Million to Revolutionize Cybersecurity Landscape

C/side Funding has secured $6 million in seed funding to bolster its innovative cybersecurity platform. This investment will accelerate the development of AI-driven solutions that help businesses stay ahead of cyber threats. With growing demand for robust security, C/side is set to expand both its workforce and global market presence. A Massachusetts-based cybersecurity firm, C/side Funding, has raised $6 million in a crucial seed funding round, allowing it to move to the next stage of its cutting-edge protection solutions. C/side is known for its advanced cybersecurity platform, which enables enterprises to detect and neutralize malicious threats in real-time and serves […]

Supply Chain Cybersecurity Fears Grow After Lebanon Pager Blasts

Supply Chain Cybersecurity Fears Grow After Lebanon Pager Blasts

The supply chain cybersecurity vulnerabilities revealed by the Lebanon pager blasts are raising global alarms. The incident has sparked discussions about how weak links in the supply chain can lead to widespread disruptions and potentially catastrophic consequences. Cybersecurity experts are now emphasizing the urgent need for improved security protocols, warning that such vulnerabilities could be exploited by malicious actors to cause both physical and digital devastation. This latest event highlights the critical importance of securing supply chains to prevent future disasters. The supply chain cybersecurity concerns emerged from the Lebanon pager blasts and have redirected the debate on the potential […]

Arctic Wolf Security Operations Report

Arctic Wolf Security Operations Report Reveals 50% Security Incidents Occur After Hours

Arctic Wolf, a cybersecurity protection services firm, released its Security Operations 2024 report, highlighting various emerging trends in enterprise security. The foreword warns that the emerging threat landscape calls for advancements in the security posture of businesses, especially technology companies which significantly trail behind others.  The report showcases the major cybersecurity risks that are affecting how businesses secure their infrastructure and networks, and that 40 to 45% of security alerts are generated during the “after-hours” of work, leading to lower detection rates.  Arctic Wolf, a security operations protection leader, has revealed some eye-opening stats about enterprise security in its Security […]

Data Altruism Law How Poland's New Data Management Act Empowers Society

Data Altruism Law: How Poland’s New Data Management Act Empowers Society

Data Altruism is at the heart of Poland’s new Data Management Act, enabling citizens to share their personal data for societal benefits voluntarily. This law establishes clear guidelines on how data can be managed altruistically. It marks a significant move towards greater transparency and ethical use of data, offering a blueprint for other countries looking to adopt similar models. In the sphere of data management, recently Poland has taken a bold step with the introduction of its new Data Altruism law. The law attempts to employ the power of citizens’ data for the benefit of all and encourages individuals to […]

Air-Gapped Systems Hacked How Secure Are Your Networks

Air-Gapped Systems Hacked: How Secure Are Your Networks?

Air-gapped computers—once considered immune to remote hacking—are now at risk. Researchers at Ben-Gurion University have discovered new techniques that allow attackers to breach these isolated systems, which were previously thought to be nearly invulnerable due to their disconnection from external networks. The emerging methods exploit the physical characteristics of these machines, revealing a new frontier in cybersecurity vulnerabilities. This breakthrough could change how organizations protect their most sensitive data, forcing them to rethink air-gapped solutions. Air-gapped computers, once touted as the most secure method of protecting sensitive data, these systems are no longer considered impenetrable. Air-gapped computers were known to […]

Fortinet Confirms Massive 440 GB Data Leak in Cyberattack Incident

Fortinet Confirms Massive 440 GB Data Leak in Cyberattack Incident

Fortinet data breach has been confirmed, with a hacker claiming responsibility for stealing 440 GB of sensitive data. This breach has raised alarm bells across the cybersecurity industry, given the scale of the stolen data. Investigations are underway to assess the damage and prevent further attacks. The incident highlights the growing challenges companies face in securing critical information against increasingly sophisticated cyber threats. Fortinet’s swift response is crucial, but questions remain about the potential impact on customers and partners. The recent breach of data on Fortinet has raised alarm bells when a hacker bragged about obtaining a massive amount of […]

Infopercept Expands Cybersecurity Reach through iValue Collaboration

Infopercept Partners with iValue to Boost India’s Cybersecurity Distribution

Infopercept partners with iValue to expand its cybersecurity footprint in India, aiming to deliver innovative security solutions to a wider network of enterprises. This collaboration will not only boost Infopercept’s presence in the region but also enhance the cybersecurity infrastructure for Indian businesses by utilizing iValue’s distribution strength. Both companies are set to leverage their combined expertise to deliver robust and efficient cybersecurity services. The partnership marks a strategic step in the evolving cybersecurity landscape, addressing growing digital threats. Infopercept picks iValue as its partner, which is quite understandable as there is increasing demand for mobile cyber security in the […]

NetGuardians Leads Swiss Banking Security, Secures 60_ of State-Owned Banks

NetGuardians Leads Swiss Banking Security, Secures 60% of State-Owned Banks

NetGuardians has become a frontrunner in Swiss banking security, with 60% of state-owned banks adopting their anti-fraud solutions. This widespread implementation highlights the critical role of digital security in the Swiss banking sector, particularly as fraud risks continue to evolve. With Swiss banks facing increasing challenges in securing online transactions, NetGuardians offers a sophisticated approach to combat financial crime. The company’s ability to safeguard banks against fraud showcases the growing reliance on advanced technologies to protect sensitive financial data. NetGuardians has achieved a significant milestone, especially in anti-fraud strategies within the financial sector by achieving a 60% market share in […]

Zero Trust Identity Approach Transforms Cybersecurity Defense

Zero Trust Identity Approach Transforms Cybersecurity Defense

Zero Trust Identity is emerging as a game-changer in cybersecurity, focusing on identity verification to secure systems in an increasingly digital world. In his recent talk, David Morimanno explored how prioritizing identity is crucial in establishing a zero-trust framework, which protects organizations against evolving cyber threats. This approach ensures that every access point is authenticated, reducing the risks of breaches and enhancing overall security. By focusing on identity as the foundation, businesses can better safeguard their digital transformation efforts while adapting to today’s cybersecurity challenges. Zero Trust Identity is proving to be a valuable addition as part of the development […]

Revolution in AI Kore.ai's XO Automation Hits AWS Marketplace

Google Faces €2.4 Billion EU Penalty Over Antitrust Violations

Google antitrust fine has resulted in the tech giant being slapped with a hefty €2.4 billion penalty by the European Union. The fine was imposed after the EU accused Google of giving preferential treatment to its Shopping service in search results. This case marks a significant legal loss for Google’s ongoing struggles with regulatory bodies. The decision comes after years of investigations, leaving the company facing a tough road ahead as it deals with growing scrutiny from European regulators. The Google antitrust penalty has created shock waves across the tech industry with the European Union (EU) knocking the company out […]

Shadow SaaS Threats How Unauthorized Apps Fuel Cyber Vulnerabilities-1

Shadow SaaS Threats: How Unauthorized Apps Fuel Cyber Vulnerabilities

The rise of Shadow SaaS is becoming a critical challenge for organizations, as unauthorized SaaS applications continue to infiltrate networks undetected. These hidden applications increase the attack surface, allowing cybercriminals to exploit unseen vulnerabilities. As businesses adopt more cloud-based services, the complexity of managing and securing these platforms grows. Tackling Shadow SaaS requires real-time visibility and control over all apps used in an organization, authorized or not. This growing trend poses significant cybersecurity threats that demand immediate attention to avoid the escalation of SaaS-based attacks. The advent of Shadow SaaS, which includes unauthorized SaaS applications that employees are compelled to […]

VPN Security Under Fire Zscaler Unveils Alarming Risks for 2024

VPN Security Under Fire: Zscaler Unveils Alarming Risks for 2024

Zscaler’s 2024 VPN Risk announcement exposes a growing list of vulnerabilities in virtual private networks (VPNs), marking a critical moment for organizations relying on remote access solutions. The report, developed by Zscaler ThreatLabz, highlights how VPNs have become a prime target for cybercriminals, with risks such as ransomware, data breaches, and malware infiltrations on the rise. This report emphasizes the need for companies to reevaluate their security strategies and adopt more advanced, zero-trust solutions to combat emerging threats. Today’s announcement of ThreatLabz, titled Zscaler’s 2024 VPN risk report, analyzes the VPN risk that is quickly becoming a significant concern in […]

UNITED STATES OF AMERICA v. APPLE INC

U.S. Government Sues Apple: A Deep Dive into the Antitrust Case

  The Department of Justice (DOJ) has filed a landmark antitrust lawsuit against Apple Inc., accusing the tech titan of engaging in anti-competitive practices that stifle market competition. This lawsuit denotes a significant escalation in the ongoing regulatory scrutiny of Apple’s business practices. The case could reshape the landscape of technology and antitrust law. In an unexpected turn of events within the tech industry, Apple Inc. has found itself facing a rather stern antitrust lawsuit courtesy of the Department of Justice. The suit was filed in the U.S. District Court, where the filing was issued against Apple for antitrust violations, […]

Banking Cybersecurity Set for Explosive Growth, Projected to Hit $467.93 Billion by 2032

Banking Cybersecurity Set for Explosive Growth, Projected to Hit $467.93 Billion by 2032

  A new report released by WiseGuy research predicts that the banking cybersecurity market will grow significantly, reaching an astounding $467.93 billion by 2032 The surge is attributed to the increasing sophistication of cyber threats targeting the financial sector and the relentless push for technological innovation in cybersecurity measures. WiseGuy recently released a report that projects how the banking world has undergone a transformation that has never been seen before, with cybersecurity evolving as a means to protect financial entities. As per the latest report, the banking cybersecurity market will hit a market value of $467.93 billion by 2032. This […]

Cybercrime Costs German Firms $298B in 2023 Says Bitkom

Cybercrime Costs German Firms $298B in 2023 Says Bitkom

  A survey by Bitkom found that cybercrime and other activity by cybercriminals have cost German businesses roughly €267 billion ($298 billion) this past year, showing a significant increase from previous years. The report by Germany’s digital association also highlighted that 9 in 10 German companies are expecting more cyber attacks in 2024 as cyber threats continue to escalate in the digital landscape. A report released by the German industry association Bitkom highlights the alarming effects of cybercrime on its businesses and economy. The survey, spanning roughly 1,000 companies across diverse sectors, found that cybercrime and other activity by cybercriminals […]

Juliette Wilcox to Head Ultra Intelligence's UK Cyber Division

Juliette Wilcox to Head Ultra Intelligence’s UK Cyber Division

Ultra Intelligence & Communications has announced a significant leadership move by appointing Juliette Wilcox, CMG, a former UK cyber official, as the President of its UK Cyber division. Wilcox, recognized for her extensive experience in cyber security, is set to lead Ultra’s strategic initiatives within the UK’s cyber landscape. This appointment underscores Ultra’s commitment to enhancing its cyber capabilities and positions the company as a key player in the UK’s defense sector, particularly as cyber threats continue to evolve. To illustrate the increasing trend of traditional defense contractors concentrating more on protecting their networks, Ultra Intelligence & Communications has appointed […]

Australia Unleashes $10B Cyber Shield to Crush Digital Threats

Australia Unleashes $10B Cyber Shield to Crush Digital Threats

Australia’s new cyber spy chief has taken on a colossal $10 billion mission, tasked with protecting the nation from escalating cyber threats. This appointment marks the start of an intensified cyber defense strategy, stirring bold reactions on X as the public closely watches the unfolding developments and what this massive investment will mean for national security. With the recent crowning of the new cyber spy head in Australia, the nation has opened new doors concerning cybersecurity owing to the fact that the newly appointed chief has a staggering amount of $10 billion designated to the department’s operational readiness. This demonstrates […]

Are Regional Banks at Risk AutoRABIT Urges to Automate Against Rising Cyber Threats

Are Regional Banks at Cyber Risk? AutoRABIT Urges Automation

  AutoRABIT is sounding the alarm for regional banks to urgently shift away from manual processes. The rising tide of cyber threats has put these financial institutions at significant risk, necessitating immediate automation measures. As cyber threats continue to increase, regional banks are increasingly being targeted by highly developed invasions. AutoRABIT, a leading company in DevSecOps automation, recently issued an alert: the manual era is already over. The firm deems this situation risky for various regional banks due to the rise in cyber criminals who exploit human errors and inefficiencies in manual workflow. Manual operations’ slow pace can provide cyber […]

How Zokyo's Penetration Testing Unveils Hidden Security Gaps

How Zokyo’s Penetration Testing Unveils Hidden Security Gaps

  Zokyo is at the forefront of cybersecurity, offering penetration testing services that go beyond conventional measures to uncover hidden vulnerabilities. By employing cutting-edge techniques, Zokyo ensures that organizations can protect their digital assets from even the most sophisticated cyberattacks. As cybersecurity threats continue to evolve, Zokyo’s penetration testing provides the robust protection needed to stay ahead of potential risks. In the era of increasingly advanced cyber threats, it is essential to recognize the significance of reasonable security measures. Penetration testing has been identified by Zokyo, a leading provider of cybersecurity solutions, as a critical process in safeguarding digital assets. […]

The Future of Cyber Defense GenAI's Role in Predicting and Preventing Threats

The Future of Cyber Defense: GenAI’s Role in Predicting and Preventing Threats

Generative Artificial Intelligence (GenAI) is rapidly changing the cybersecurity landscape, offering advanced solutions to predict, identify, and anticipate cyber threats. Traditional threat detection methods are struggling to keep pace with the sophistication of modern cyber-attacks. GenAI, with its ability to process vast amounts of data and recognize patterns, is emerging as a critical tool for enhancing cybersecurity measures.  Brandefense delves into how GenAI is revolutionizing threat detection and response, offering a new frontier in protecting digital assets from increasingly complex cyber threats. Traditional threat detection methods need to be revised in an era of increasingly complex and frequent cyber threats. […]

Boost Your Device Security with Microchip's Advanced ECC204, SHA104, SHA105 ICs

Boost Your Device Security with Microchip’s Advanced ECC204, SHA104, SHA105 ICs

Microchip Technology has unveiled three new CryptoAuthentication ICs—ECC204, SHA104, and SHA105—designed to significantly bolster security for connected devices. These advanced ICs are engineered to meet the increasing demand for robust security measures across industries, ensuring that sensitive data remains protected against emerging cyber threats. With the ECC204 providing asymmetric authentication, and the SHA104 and SHA105 offering strong symmetric authentication, Microchip’s new lineup is poised to set new standards in device security, making it a critical upgrade for manufacturers and developers alike. In an era when cyber threat actors are becoming more advanced in their techniques, security measures have become a dire […]

Cisco Enhances Splunk with Talos Threat Intelligence Integration

Cisco Enhances Splunk with Talos Threat Intelligence Integration

  Cisco has announced the integration of its Talos Threat Intelligence with Splunk, offering users across industries advanced threat detection and enhanced security insights. This move aims to empower Splunk users by providing real-time intelligence to mitigate cyber threats more effectively. With the ever-growing complexity of cyberattacks, Cisco’s Talos Intelligence will bolster Splunk’s capabilities, making it a powerful tool for organizations to safeguard their digital infrastructure. Cisco’s integration of its renowned Splunk into Talos Threat Intelligence is a huge leap in cybersecurity. Cisco’s premier threat intelligence service, Talos, has extensive research on cyber threats and actionable insights. The integration allows […]

Iran's New Cyber Tactic Targeting Israel's Collective Consciousness

Iran’s New Cyber Tactic: Targeting Israel’s Collective Consciousness

In a recent development, Iran has launched a sophisticated cyber attack aimed at influencing Israel’s public consciousness. This novel approach goes beyond traditional cyber warfare, targeting the psychological well-being of the populace. This article delves into the specifics of Iran’s new cyber strategy, its implications for Israel, and the broader impact on global cybersecurity dynamics. The New Cyber Tactic Iran has deployed a new concept in its ongoing fight against Israel: a cyber assault aimed at shaping the national consciousness of the Israelis. This is different from conventional cyber-attacks, which typically target infrastructure or financial systems. Iran has chosen to […]

Hackers Outsmart Microsoft 365 with CSS Tricks A Security Breakdown

Hackers Outsmart Microsoft 365 with CSS Tricks: A Security Breakdown

  Cybersecurity experts have identified a new vulnerability in Microsoft 365’s antiphishing feature, which can be bypassed using CSS style tags. This revelation raises significant concerns about the robustness of current security measures and the need for immediate updates to protect users. Microsoft 365, which is widely used by businesses and organizations, has a critical flaw in its antiphishing system. Attackers are using CSS style tags to bypass this security feature and thus allow phishing emails to go unnoticed by the users’ systems. It involves embedding malicious content into CSS code, something that the antiphishing does not identify as dangerous. […]

Revolutionizing Cyber Security The Future of Active Cyber

Revolutionizing Cyber Security: The Future of Active Cyber Defence 2.0

“Active Cyber Defence (ACD) 2.0 is poised to revolutionize cyber security by introducing a new generation of services developed in collaboration with industry and academia. The National Cyber Security Centre (NCSC) aims to enhance national cyber resilience through this initiative.” “By leveraging unique capabilities and partnerships, ACD 2.0 will address modern cyber threats with innovative solutions. The NCSC plans to divest successful services to industry or government sectors, ensuring sustainable, long-term protection against cyber attacks.” Synopsis of the ACD 2.0 Initiative: Active Cyber Defence (ACD) 2.0 is an important step forward in the UK’s approach to cyber security. The plan […]

Meta Agrees to $1.4 Billion Settlement with Texas Over Biometric Data Violations

Meta Agrees to $1.4 Billion Settlement with Texas Over Biometric Data Violations.

  Meta, the parent company of Facebook, Instagram, and WhatsApp, has reached a record $1.4 billion settlement with Texas over allegations of illegal biometric data collection. This unprecedented legal action highlights the serious implications of violating biometric privacy laws and sets a significant precedent for future cases. The deal, worth $1.4 billion, was reached between Meta Platforms Inc., the technology giant that operates Facebook, WhatsApp and Instagram, and the state of Texas. The lawsuit filed by the Texas Attorney General, Ken Paxton, claimed that Meta collected biometric information from millions without their consent. This is a standout case among privacy […]

Critical VMware ESXi Flaw Exploited by Hackers!

Critical VMware ESXi Flaw Exploited by Hackers!

    Hackers are targeting a severe flaw in VMware ESXi, threatening critical infrastructure and prompting an urgent call for updates. This exploitation underscores the importance of timely patching and vigilance in cybersecurity practices. Critical Vulnerability of VMware ESXi Exploited by Hackers Surprisingly, cybercriminals launched several attacks against a serious loophole in the VMware ESXi. Called CVE-2024-XXXX, this vulnerability could bring down core infrastructures, which has caused cybersecurity experts to panic. It is a favorite choice for hackers because it allows unauthorized access to systems. These have been very sophisticated attacks that utilize the flaw to infiltrate and compromise systems […]

Singapore's Cybersecurity Evolution AI Risks and Resilience

Navigating AI Threats: Singapore’s 2023 Cybersecurity Evolution

  In 2023, Singapore’s cybersecurity landscape showcased remarkable progress amidst evolving threats. The rise of AI-driven attacks highlighted vulnerabilities, compelling organizations to adopt robust defense mechanisms. The Cyber Security Agency of Singapore (CSA) reported a decline in phishing attempts and website defacements but emphasized the growing sophistication of cyber threats, necessitating continuous adaptation and vigilance. Global Trends and Local Impact: The year 2023 witnessed an escalation in the scale of global cyber threats with AI-driven cyber terrorism. A number of high-profile cases that involved ransomware campaigns, as well as data breaches demonstrated the need for robust cybersecurity measures. In Singapore, […]

Stargazer-Goblin-Creates-3000-Fake-GitHub

Stargazer Goblin’s $100K Scam: 3,000 Fake GitHub Accounts Exposed

  Stargazer Goblin has established a network of over 3,000 fake GitHub accounts to distribute various malware strains, earning approximately $100,000 over the past year. Check Point’s investigation uncovers this extensive operation, highlighting how these accounts maintain a facade of legitimacy through activities like starring and forking repositories. The Operation’s Scope A Stargazer Ghost Network created by Stargazer Goblin composed of over 3,000 false GitHub accounts spread across thousands of repositories. Malware such as Atlantida Stealer, Rhadamanthys, and RedLine Stealer is distributed using these accounts. Operating since August 2022, the operation uses the Distribution-as-a-Service (DaaS) model, which capitalizes on its […]

Gh0st RAT Trojan Exploits Fake Chrome Site to Target Chinese Users

Gh0st RAT Trojan Strikes Again: Fake Chrome Site Targets Chinese Users

  The Gh0st RAT Trojan is reemerging with a new tactic, targeting Chinese-speaking Windows users through a fake Chrome website. Cybersecurity firm eSentire has uncovered this drive-by download scheme, highlighting the dangers of deceptive installer packages masquerading as legitimate software. The Threat Landscape Gh0st RAT, a well-known malware active since 2008, has become a significant threat targeting Chinese Windows users. This Trojan is being delivered through an evasive dropper named Gh0stGambit, which operates as part of a drive-by download attack. Users searching for Google’s Chrome browser are deceived into downloading a malicious installer from a fake website (“chrome-web[.]com”). This installer […]

PKfail UEFI Malware Threatens 200+ Device Models

200+ Devices at Risk: The Alarming PKfail Vulnerability

  The PKfail vulnerability compromises Secure Boot, putting over 200 device models at risk of UEFI malware attacks. Discovered by Binarly Research Team, this flaw involves untrusted test keys and leaked private keys, affecting major vendors like Acer, Dell, and HP. PKfail: A Critical Firmware Supply-Chain Issue PKfail vulnerability is a major security concern that affects the UEFI ecosystem’s secure boot implementation. PKfail weakens Secure Boot, which was designed to allow only trustworthy software during boot-up time. It all starts with Independent BIOS Vendors (IBVs), for instance, American Megatrends International (AMI), who make use of untrusted test keys that many […]

Wiz Ends $23 Billion Acquisition Talks with Google

Wiz Rejects Google’s $23 Billion Acquisition Offer

Israeli cybersecurity startup Wiz has decided to end dialogues with Google parent Alphabet regarding a proposed $23 billion acquisition deal. Instead, Wiz plans to focus on an initial public offering (IPO) and aims to grow its business to generate $1 billion in annual revenues, as stated by CEO Assaf Rappaport. Israeli cybersecurity startup Wiz has announced it will no longer engage with Google’s parent company, Alphabet, in recent talks over what would have been a $23bn takeover deal. A memo from Wiz CEO Assaf Rappaport showed the company’s intention to float on the stock market and grow its business, earning […]

New Play Ransomware Targets VMware ESXi Systems

Cybersecurity Alert: Play Ransomware Expands to VMware ESXi

Cybersecurity experts have identified a new Linux variant of the notorious Play ransomware, which is now targeting VMware ESXi environments. This development indicates a broader attack strategy, posing greater risks to critical business infrastructure. Play ransomware, known for its double extortion tactics, has evolved. It leverages a range of tools and techniques to infiltrate and encrypt virtual machines, demanding ransoms for decryption keys. The malware’s expansion to Linux platforms marks a significant shift in its threat landscape. Broad Attack Strategy Play ransomware, which has been a formidable threat since its entry into the market in June 2022, uses double extortion […]

CrowdStrike Updates

CrowdStrike Update Sparks Unprecedented Global IT Chaos

CrowdStrike, a leading cybersecurity firm, released a faulty software update, leading to a massive outbreak affecting Microsoft, grounding flights, disbursing banking systems, and impacting daily operations WordlWide Microsoft said they were confident that the issue would soon be addressed, while Craig Williams of CrowdStrike offered a temporary resolution to affected devices. This incident also pointed to the importance of cyber security firms and their far-reaching implications following updates. Global Disruption: CrowdStrike software update bug spread wide causing collapse of Microsoft’s services leading to huge disruptions in various sectors.The shutdowns indicated how susceptible are global interconnections with financial institutions including airlines […]

AI-enabled crimes surge in crypto, as per Elliptic study

AI-enabled crimes surge in crypto, as per Elliptic study

Elliptic has conducted a study that has determined that the crypto industry is experiencing an increase in the number of crimes that are enabled by AI. They are not necessarily associated with the withdrawal of funds from an account. They even go so far as to lure the community into investing in a specific token. One way to mitigate such risks is by taking timely and measured responses, given that most attacks are still in their early stages. This should not be confused with the fact that malicious actors will ever deploy advanced measures to fool stakeholders. There is a […]

Darktrace unveils new AI-powered MDR service

Darktrace unveils new AI-powered MDR service

Leading AI for cybersecurity company Darktrace has unveiled its latest innovation, the Darktrace Managed Detection & Response (MDR) service. This innovative approach integrates Darktrace’s advanced detection and response capabilities with the company’s global team of analysts. The MDR service is designed to provide internal security teams with AI-driven threat response and professional alert management across multiple Darktrace environments so that they can focus on more strategic security tasks, such as enhancing cyber defenses. MDR has been introduced to address emerging concerns about increasingly complex threats harbored by artificial intelligence. The same Darktrace State of AI Cybersecurity 2024 report shows that […]

Companies wary of AI-fuelled malware, phishing Report copy

AI-backed malware and phishing: A global concern for businesses

Reputable cyber security experts are concerned about the adverse consequences of cyber security in the modern digital age. They are concerned about the negative consequences of artificial intelligence, such as malware and phishing, fueled by AI. A large chunk of business organizations uses artificial intelligence in cybersecurity defense endeavors.  A global survey illuminates identity-related attacks, including artificial intelligence-supported malware and phishing. Business organizations expect AI-enabled tools to create cyber risk in 2025. The survey states that 93% of Indian companies had two or more identity-related cybersecurity breaches in the previous year. Data leakage from compromised artificial intelligence prototypes, AI-equipped malware, […]

Singapore Cybersecurity Update Puts Cloud Providers on Notice

Singapore strengthens cybersecurity with updated act and expanded CSA authority

Singapore has amended the Cybersecurity Act to ensure that it is updated with the current trend of people facing online threats in multiple forms. At the core is the basic requirement of reporting incidents to relevant authorities. Other layers highlight that the region’s cybersecurity agency now has more power to regulate critical infrastructure along with third parties. The update to the Act was made on May 07, 2024, and now takes into account more than a single aspect. For instance, it explores the impact of running CI management systems on cloud infrastructure. This became essential because operators have now outsourced […]

Impact of AI on cybersecurity grows

Impact of AI on cybersecurity grows

Artificial Intelligence, AI, brings both sides of the coin to cybersecurity. One side depicts an increase in security reliability. The second side depicts the usage of AI to exploit vulnerabilities. The prime advantage of AI that the world is looking to take is its utility in developing a safeguard against potential attacks. An AI model’s core objective is to identify and prevent such attacks or, at the least, inform the backend team about them so they can take proactive measures. Columbia School of Professional Studies highlighted in a study that almost 100% of the companies they interviewed are willing to […]

Google includes cybersecurity in its AI ecosystem

Google includes cybersecurity in its AI ecosystem

Google has introduced Threat Intelligence as a new cybersecurity measure in the AI ecosystem. It effectively brings its three platforms together—Mandiant, Gemini, and VirusTotal—with every platform performing its respective role to boost cybersecurity at a time when generative AI is on the rise. Communities are exploring different implementations of generative AI that practically go beyond editing photos. Google Threat Intelligence leverages Gemini 1.5 Pro to make the process more efficient. Gemini 1.5 Pro has passed the test of analyzing the WannaCry virus code. The ransomware attack was detected in 2017, affecting several industries across the world. Released in February, Gemini […]

NEXCOM’s stand against cybersecurity breaches

NEXCOM’s stand against cybersecurity breaches

NEXCOM, a top provider of network services, is examining viable applications for fighting cybersecurity breaches. The research scours the potential of NEXCOM’s NSA 7160R servers, considering multiple hardware permutations and combinations in a similar mechanism for solving cybersecurity threats.  It primarily deals with two AI prototypes, MalConv and Bert’s base case. It stresses the importance of latency and output related to cybersecurity, helping all involved in cybersecurity and IT take educated steps to empower their strategy against ever-changing cyber breaches.  As per the results of the experiment, the NSA 7160R can correctly identify polymorphic and unknown malware types. Additionally, it […]

AI boosts underwriting, But underwriters' confidence lags

AI boosts underwriting, But underwriters’ confidence lags

Today, Capgemini Research Institute published its World Property and Casualty Insurance Report 2024, revealing operational challenges and technologies to watch for in insurance. The report underlines that only 8% of property and casualty (P&C) insurers are among underwriting “trailblazers,” the ones that combine AI-driven insights with automation and use them to achieve better decision-making and risk assessment processes. They are outperforming their peers and gaining large collaboration and customer trust by involving underwriters in all decision-making processes. The report covers major challenges encountered by the P&C industry as they struggle with a progressively complex environment. Policyholders are willing to pay […]

Friend or foe? AI’s growing influence on cybersecurity

Friend or foe? AI’s growing influence on cybersecurity

Artificial intelligence, or AI, has emerged as a double-edged sword. This is for two reasons: it serves the world but also brings vulnerabilities that can be exploited easily. While the level of ease has considerably come down, vulnerabilities remain consistent throughout the world, leaving organizations wondering if they are secure in the hands of AI tools. It looks gloomy, but it is also important to understand that every technology has its say on both sides. The internet connects people but also allows hackers to steal information and funds, for example. The rise of AI-powered threats An initial emphasis on AI-powered […]