2025-04-10Per Henrikson
The data breach is a wake-up call for Morocco’s public and private sectors as the North African country undergoes rapid digitization.
View more
2025-04-05Per Henrikson
As per reports, AI can create photorealistic fake identification documents, such as Aadhaar and PAN cards. This has raised security concerns among taxpayers and citizens. India fights these attempts by using new secure QR codes containing encrypted data that can only be deciphered by authorised scanners.
View more
2025-03-30Per Henrikson
Over 1.6 million files containing sensitive user data and internal system credentials were left unsecured in a misconfigured Amazon Web Services (AWS) S3 bucket.
View more
2025-03-24Per Henrikson
Gartner has projected a significant shift in the cybersecurity landscape by 2027, with AI agents expected to halve the time required to exploit account exposures. The technology research and consulting firm highlights account takeover (ATO) as a persistent threat, primarily due to weak authentication credentials, such as passwords.
View more
2025-03-23Ian Fleming
Tax season is almost here and this year there have been warnings about new AI-powered scams in addition to phishing and impersonation attacks.
View more
2025-03-20Per Henrikson
Over 188 million threats were blocked in the region during H1 2024 by Trend Micro, while anticipating a surge in AI-powered attacks and ransomware tactics in 2025.
View more
2025-03-20Ian Fleming
Phone scammers are increasingly using voice cloning technology to impersonate loved ones and trick individuals into handing over money, and experts recommend establishing a secret code word, checking before acting, creating an emergency contact list, and being cautious about social media to reduce the risk of falling prey to these scams.
View more
2025-03-17Per Henrikson
Trend Micro's 2025 predictions report also warns of the potential for malicious “digital twins” where breached or leaked personal information is used to train an AI model to mimic the knowledge, personality, and writing style of a victim or employee.
View more
Your experience on this site will be improved by allowing cookies
Cookie Policy