Menu

Blog

Archive for the ‘cybercrime/malcode’ category

Dec 4, 2024

Old Battles, New Wars: Rediscovering Encryption’s Power To Prevent Data Breaches

Posted by in categories: cybercrime/malcode, encryption, health

In this respect, I believe regulators have fallen short. In a world facing ongoing cyber threats, the standards for cybersecurity are set surprisingly low that their rules typically only recognize encryption of all stored data as a requirement. This is despite the fact that encryption—not firewalls, monitoring, identity management or multifactor authentication—is the purpose-built technology for protecting data against the strongest and most capable adversaries. Stronger regulations are needed to ensure encryption becomes a mandated standard, not just an optional recommendation.

Fortunately, companies need not wait until regulators realize their folly and can opt to do better today. Some companies already have. They approach data security as an exercise in risk mitigation rather than passing an audit. From this perspective, data encryption quickly becomes an obvious requirement for all their sensitive data as soon as it is ingested into a data store.

Another beneficial development is that encryption has become easier and faster to implement, including the ability to process encrypted data without exposure, a capability known as privacy-enhanced computation. While there will always be some overhead to adopting data encryption, many have found that the return on investment has shifted decisively in favor of encrypting all sensitive data due to its substantial security benefits.

Dec 3, 2024

IIoT: Driving The Future Of Manufacturing With AI And Edge Computing

Posted by in categories: business, cybercrime/malcode, robotics/AI

While the technology itself is impressive, its true potential lies in how leaders manage its adoption. Fostering a culture of innovation and continuous learning is crucial for success in this new industrial era. Leaders must ensure that their workforce is not only comfortable with automation but is also empowered to collaborate with AI-driven systems. Upskilling and reskilling employees to work alongside AI will create a workforce capable of leveraging technology to enhance operational efficiency.

It’s also essential for business leaders to prioritize cybersecurity and data privacy. The increased connectivity that comes with IIoT introduces new vulnerabilities, and safeguarding company and customer data must be a top priority.

AI, edge computing and IIoT represent a fundamental shift in the way industries operate. The future of manufacturing is not just automated. It is also intelligent, with systems that learn, predict and adapt in real time. For leaders, the challenge is not only implementing these technologies; it’s also fostering an environment of innovation where technology, data and human expertise work together to achieve operational excellence.

Dec 2, 2024

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

Posted by in category: cybercrime/malcode

Hackers misuse Godot Engine in the GodLoader campaign, infecting 17,000+ systems undetected via GitHub.

Dec 2, 2024

INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

Posted by in categories: business, cybercrime/malcode, finance

“The effects of cyber-enabled crime can be devastating – people losing their life savings, businesses crippled, and trust in digital and financial systems undermined,” INTERPOL Secretary General Valdecy Urquiza said in a statement.

“The borderless nature of cybercrime means international police cooperation is essential, and the success of this operation supported by INTERPOL shows what results can be achieved when countries work together. It’s only through united efforts that we can make the real and digital worlds safer.”

As part of HAECHI-V, INTERPOL said Korean and Beijing authorities jointly dismantled a widespread voice phishing syndicate responsible for financial losses totaling $1.1 billion and affecting over 1,900 victims.

Dec 2, 2024

Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

Posted by in category: cybercrime/malcode

Rockstar 2FA phishing kit bypasses MFA, stealing Microsoft 365 credentials via AitM attacks and trusted platforms.

Nov 28, 2024

The Structure of Scientific Revolutions

Posted by in categories: biotech/medical, cybercrime/malcode

Free ebook #freeisgood — 50th Anniversary Edition ~ Thomas S. Kuhn.

Pdf…


“One of the most influential books of the 20th century,” the landmark study in the history of science with a new introduction by philosopher Ian Hacking (Guardian, UK).First published in 1962, Thomas Kuhn’s The Structure of Scientific Revolutions” reshaped our understanding of the scientific enterprise and human inquiry in general.” In it, he challenged long-standing assumptions about scientific progress, arguing that transformative ideas don’t arise from the gradual process of experimentation and data accumulation, but instead occur outside of “normal science.” Though Kuhn was writing when physics ruled the sciences, his ideas on how scientific revolutions bring order to the anomalies that amass over time in research experiments are still instructive in today’s biotech age (Science).

Continue reading “The Structure of Scientific Revolutions” »

Nov 28, 2024

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

Posted by in category: cybercrime/malcode

T-Mobile thwarts cyber intrusion from wireline provider’s network, ensuring no data breach or service disruption.

Nov 28, 2024

APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign

Posted by in category: cybercrime/malcode

APT-C-60 exploits WPS Office flaw to deliver SpyGlace malware via phishing, targeting Japan with advanced techniques.

Nov 27, 2024

How AI Dragons Set GenAI on Fire This Year

Posted by in categories: cybercrime/malcode, ethics, robotics/AI

While LLMs are trained on massive, diverse datasets, SLMs concentrate on domain-specific data. In such cases, the data is often from within the enterprise. This makes SLMs tailored to industries or use cases, thereby ensuring both relevance and privacy.

As AI technologies expand, so do concerns about cybersecurity and ethics. The rise of unsanctioned and unmanaged AI applications within organisations, also referred to as ‘Shadow AI’, poses challenges for security leaders in safeguarding against potential vulnerabilities.

Predictions for 2025 suggest that AI will become mainstream, speeding up the adoption of cloud-based solutions across industries. This shift is expected to bring significant operational benefits, including improved risk assessment and enhanced decision-making capabilities.

Nov 27, 2024

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

Posted by in category: cybercrime/malcode

INTERPOL arrests 1,006 in Africa, dismantling 134,089 cybercrime networks and saving $193M from online fraud.

Page 1 of 22112345678Last