Blog
How this malware bypasses Android security mechanisms
November 10, 2023
0 Comment
By Daniel Casil
A dangerous malware has managed to bypass the security mechanisms put in place by Google with Android 13. Called SecuriDropper, this virus imitates the behavior of an application from the Play Store to be able to install spyware or malware designed to steal your account in the bank. Computer security researchers at ThreatFabric have discovered
By Anshu Bansal
The digital space we navigate daily is filled with hidden threats and vulnerabilities just waiting to be exploited by cybercriminals. The conventional notion of cybersecurity isn’t simply a task to be checked off on a proactive business security checklist; rather, it constitutes a constantly evolving and persistent challenge. As someone
By Wayne Dorris
There is considerable overlap between physical security and cybersecurity, particularly when it comes to protecting critical infrastructure. Preventing infrastructure from being tampered with demands significant investment in physical security, but any device connected to the internet represents a potential attack point to the broader network. Devices that lack sufficient protections
By David Tidmars
Cyber crime, as the name suggests, is the use of digital technologies such as computers and the internet to commit criminal activities. Malicious actors (often called “cyber criminals”) exploit computer hardware, software, and network vulnerabilities for various purposes, from stealing valuable data to disrupting the target’s business operations. The different
Predictive AI in Cybersecurity: Outcomes Demonstrate All AI is Not Created Equally
November 8, 2023
0 Comment
By Shiladitya Sircar
Here is what matters most when it comes to artificial intelligence (AI) in cybersecurity: Outcomes. As the threat landscape evolves and generative AI is added to the toolsets available to defenders and attackers alike, evaluating the relative effectiveness of various AI-based security offerings is increasingly important — and difficult. Asking the right questions can