Aggregator
原生鸿蒙正式发布,国产操作系统进入自主可控时代
AI and deepfakes fuel phishing scams, making detection harder
AI impersonation is now the hardest vector for cybersecurity professionals to protect companies against, according to Teleport. The study, which surveyed 250 senior US and UK decision-makers, shows that social engineering remains one of the top tactics cybercriminals use to install malware and steal sensitive data, with the advancement of AI and deepfakes further fueling the effectiveness of phishing scams. Advanced phishing tactics on the rise When asked to rank the difficulty of each attack … More →
The post AI and deepfakes fuel phishing scams, making detection harder appeared first on Help Net Security.
How to enable Safe Browsing in Google Chrome on Android
To safeguard your data, Google Chrome uses Safe Browsing to protect you from: harmful websites and extensions, malicious or intrusive advertisements, malware, phishing attacks, and social engineering threats. Safe Browsing scans and evaluates websites to identify potentially harmful sites, which are then added to its database. Whenever you visit a website or try to download something, Google Chrome consults Safe Browsing according to the protection level you’ve chosen. How to choose your Safe Browsing protection … More →
The post How to enable Safe Browsing in Google Chrome on Android appeared first on Help Net Security.
WhatsApp now encrypts contact databases for privacy-preserving synching
How to Checkmate in SaaS with the Power of Free
How to Thrive in a Distributed Team
Remote work is a critical part of the future of cybersecurity and many other industries. For those who continue to work remotely or in a hybrid model, the need for robust cybersecurity practices needs to be a priority. But one of the biggest obstacles to that is isolation.
Why Vetting AI Vendor Security Is Critical in Healthcare
Cloud Defender Stream.Security Raises $30M, Eyes US Growth
With a $30 million boost from Series B funding, Stream.Security will enhance its cloud security offerings. The company’s focus includes auto-remediation, faster, AI-driven threat responses, increased support for multi-cloud and hybrid environments, and boosted market presence in the U.S. and beyond.
Fortinet Discloses Actively Exploited Zero-Day
Fortinet disclosed an actively exploited vulnerability in its centralized management platform following more than a week of online chatter that edge device manufacturer products have been under renewed attack. Cybersecurity researcher Kevin Beaumont christened the vulnerability "FortiJump."
Embargo Ransomware Disables Security Defenses
A recently constituted and apparently well-resourced ransomware player is developing and testing tools to disable security defenses, including a method that exploits a vulnerability in drivers. Embargo first surfaced in April amid an ongoing shakeup in the ransomware world.
White House Reviewing Updates to HIPAA Security Rule
The Department of Health and Human Service last Friday submitted for White House review long-awaited updates to the 20-year-old HIPAA Security Rule containing modifications aimed at strengthening the cybersecurity of electronic protected health information.