2025-04-23Per Henrikson
North Korean IT workers have begun using real-time deepfake technology to conceal their true identities during job interviews, according to a U.S. cybersecurity firm, highlighting the increasing sophistication of their remote work schemes to raise money for the sanctioned regime.
View more
2025-04-21Per Henrikson
“Cybercriminals are most often breaking in without breaking anything – capitalizing on identity gaps overflowing from complex hybrid cloud environments that offer attackers multiple access points.”
View more
2025-04-21Per Henrikson
North Korean IT workers are reportedly using real-time deepfakes to secure remote work, raising serious security concerns. We explore the implications. North Korean IT workers are reportedly using real-time deepfakes to secure remote work, raising serious security concerns. We explore the implications.
View more
2025-04-10Per Henrikson
The data breach is a wake-up call for Morocco’s public and private sectors as the North African country undergoes rapid digitization.
View more
2025-04-05Per Henrikson
As per reports, AI can create photorealistic fake identification documents, such as Aadhaar and PAN cards. This has raised security concerns among taxpayers and citizens. India fights these attempts by using new secure QR codes containing encrypted data that can only be deciphered by authorised scanners.
View more
2025-03-30Per Henrikson
Over 1.6 million files containing sensitive user data and internal system credentials were left unsecured in a misconfigured Amazon Web Services (AWS) S3 bucket.
View more
2025-03-24Per Henrikson
Gartner has projected a significant shift in the cybersecurity landscape by 2027, with AI agents expected to halve the time required to exploit account exposures. The technology research and consulting firm highlights account takeover (ATO) as a persistent threat, primarily due to weak authentication credentials, such as passwords.
View more
2025-03-23Ian Fleming
Tax season is almost here and this year there have been warnings about new AI-powered scams in addition to phishing and impersonation attacks.
View more
Your experience on this site will be improved by allowing cookies
Cookie Policy