
German police dismantles illegal crypto exchanges
The German Federal Criminal Police Office (BKA), in cooperation with the Central Office for Combating Internet […]
SecureNet, JISA Softech Announce Strategic Partnership
JISA Softech and SecureNet have announced a strategic partnership aimed at enhancing data protection and privacy […]

LLMjacking: How attackers use stolen AWS credentials to enable LLMs and rack up costs for victims
The black market for access to large language models (LLMs) is growing, with attackers increasingly abusing […]

MFA adoption is catching up but is not quite there
While the adoption of multifactor authentication has picked up in the face of growing identity threats, […]

Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram
Sensitive customer data from Star Health and Allied Insurance, India’s largest standalone health insurer, has been […]

How to Prevent Data Exfiltration
What is Data Exfiltration? When someone steals important information, usually with the intent of misusing it, […]

Want to know how the bad guys attack AI systems? MITRE’S ATLAS can show you
It’s one thing to understand that artificial intelligence introduces new and rapidly evolving threats, but it’s […]

What is pretexting? Definition, examples, and attacks
Pretexting definition Pretextingis form of social engineering in which an attacker fabricates a story to convince a victim […]

Reveal of Chinese-controlled botnet is another warning to CISOs to keep up with asset and patch management
A Chinese-controlled botnet of tens of thousands of unpatched internet-connected firewalls, network attached storage devices, internet-connected […]

Need better network performance? Adopt better secure networking strategies
Many organizations consider digital acceleration a key initiative because those in the C-Suite and IT leadership […]