Dating apps collect and sell user location data, leading to significant privacy risks. Users are vulnerable to stalking, harassment and even prosecution in certain countries, says Victor Le Pochat, postdoctoral researcher at KU Leuven. Pochat and Dhont called for improved data protection measures.
In today’s AI-driven world, banks are becoming increasingly vigilant, often freezing accounts or demanding extensive documentation at the slightest hint of suspicious activity. Sending money, once a straightforward task, is now fraught with complexity.
Companies historically responded to M&A reports with milquetoast statements about "not commenting on rumors or speculation," but aggressive clapbacks have become much more common. Increasingly, executives are willing to attract more publicity by publicly - and vocally - denying acquisition reports.
The CrowdStrike outage exposed recovery challenges, highlighting cloud systems' resilience over physical infrastructure. Jonathan Hatzor, co-founder and CEO of Parametrix, advises CIOs and CISOs on strategies that can effectively manage, mitigate and transfer risks.
SafeBreach security researcher Alon Leviev discusses how downgrade attacks expose vulnerabilities in Windows systems. He shares insights into how attackers manipulate Windows Update processes and stresses the importance of monitoring and securing critical system components to prevent exploitation.
Russian hackers are leveraging unpatched vulnerabilities to exploit networks for more than 20 months. Michael Sikorski, VP of threat intelligence at Palo Alto Networks, shares insights on ransomware gangs, AI's role in attacks and the importance of defense-in-depth strategies for organizations.
The Australian Signals Directorate's Australian Cyber Security Center released joint guidance with a cohort of international cyber agencies that aims to provide baseline standards for event logging and threat detection, amid a wave of high-profile attacks employing "living off the land" techniques.
Maricopa County CISO Lester Godsey highlights the growing threat of misinformation and its impact on election security. He explains how his team is integrating cybersecurity frameworks to address both digital and physical risks, focusing on disinformation campaigns and election integrity.
Today's workforce is increasingly insisting on having employer-provided education and development opportunities. Learn why offering employees opportunities for education and development is both a retention strategy and a key component of a successful business strategy.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
McLaren Health Care expects IT disruptions caused by a ransomware attack earlier this month to last through the end of August. While most of McLaren's facilities are open, IT systems across its hospitals, cancer centers and clinics are still affected, including electronic medical record access.
North Korea's Lazarus hacking team, which focuses on cryptocurrency theft and espionage, has once again been exploiting a zero-day vulnerability in Microsoft Windows to install antivirus-suppressing malware dubbed Fudmodule to aid its intrusions.
Action1 has rebuffed CrowdStrike's interest in acquiring the patch management and vulnerability remediation startup for $1 billion and opted to remain independent. Action 1 has decided to turn down acquisition inquiries since the company believes it can grow into a multibillion-dollar business.
Many cybersecurity organizations hope generative artificial intelligence and large language models will help them secure the enterprise and comply with the latest regulations. But to date, commercial LLMs have big problems - hallucinations and a lack of timely data, said NYU professor Brennan Lodge.
France’s cyber defense agency teamed up with governments and security experts from across the globe to identify and mitigate a historic level of both physical and cyber threats following years of preparation, experts tell Information Security Media Group.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.