Threat actors can misuse advanced technologies like Artificial Intelligence (AI) and Machine Learning (ML) to launch sophisticated cyberattacks and invent new kinds of malicious operations. A joint report from the United Nations Interregional Crime and Justice Research Institute (UNICRI),...
The Internet is not fair. From harmful scam emails to cybercriminals trying to break into your systems, the online space is full of uncertainty. When talking about online threats, cyberattacks have become more common in the online gaming industry....
Chaitanya Hiremath is the CEO of San Francisco-based AI firm, Scanta Inc. He is the first Indian-origin entrepreneur to win the Shark Tank Showcase and the prestigious Draper University ‘Summer Pitch’ in 2018 in San Francisco. In 2019, he...
The attack surface is rapidly expanding and continues to evolve at an unprecedented pace. Cyberattacks are becoming more sophisticated and are proliferating at lightning speed. There are innumerable and varying cyberthreats that need to be detected, prevented, and analyzed...
Google is finally ready to roll out end-to-end encryption (E2EE) in its latest RCS standard for Android messaging.
With this upgrade, Google has taken its user privacy offering a notch higher by shielding the content of the messages from everyone...
A cybercrime research report from Clario and Demos revealed that nearly 64% of Americans are worried about their financial data being accessed illegally, and 53% think there have been more online scams since the beginning of the pandemic. The...
Managed web hosting provider Managed.com has temporarily taken down its servers and web hosting systems after suffering a suspected ransomware attack. In a security release, the company stated that they had encountered an issue affecting the availability of their...
As if 2020 wasn’t challenging enough for businesses, reports warn that Managed Service Providers (MSPs), often contracted to provide outsourced IT and cybersecurity services, can represent a significant security risk to the companies they protect. The U.S. Government and...
In response to the multiple Cisco Security Manager vulnerabilities reported by security researcher Florian Hauser, the networking device manufacturer has published three advisories. The vulnerabilities, if exploited, allow remote code execution (RCE), thus giving the attacker complete control of...
Cybercriminals are increasingly leveraging social engineering scams via sophisticated phishing techniques. According to a research from Ironscales, nearly 50% of all advanced phishing attacks like spear-phishing and social engineering evade popular secure email gateways (SEGs). Ironscales researchers stated they...














