The future after AI: are we ready for the post-AI era?
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
175 articles
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
From the alarming rise of AI-powered cyberthreats to the often-overlooked human factor, discover how the interplay of technology and human behaviour shapes the future of cyber-defence in India.
Dive into the depths of AI’s promised game-changing effects and also its perils, emerging AI threats, and our CEO’s vision for cyber immunity at our APAC Cybersecurity Weekend 2023.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
What signs may indicate that a device is infected or being attacked by a hacker.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
How APTs compromise the privacy and security of average citizens that they do not target directly.