What do trends in one Q1 2024 cyber landscape report translate to?
Now that we are in Q2, Q1 threat reports will point to what individual and state-sponsored threat actors have been perpetrating In its analysis of Q1 2024 cyber incidents in its user ecosystem, a...
View ArticleWhat businesses need to know about SEO poisoning
The urgency for enhanced measures and awareness of SEO poisoning cannot be overstated, as we navigate through turbulent waters in the digital domain. One trend that is vividly captured in...
View ArticleSparrow Co., Ltd. to Showcase the Latest Supply Chain Security Solutions at...
SINGAPORE, April 16, 2024 /PRNewswire/ — Sparrow Co., Ltd., a leading provider of application security services, will be showcasing its latest application security solutions at Black Hat Asia 2024,...
View ArticleDahua Technology Releases 2023 ESG Report
HANGZHOU, China, April 17, 2024 /PRNewswire/ — Dahua Technology, a world-leading video-centric AIoT solution and service provider, has unveiled its 2023 Environmental, Social and Governance Report,...
View ArticleVIVOTEK Launches Successful Make Tomorrow Easier, Today! Vision During ISC...
TAIPEI, April 19, 2024 /PRNewswire/ — VIVOTEK (3454-TW), the global leading IP security solution provider, announces that last week’s 2024 ISC West trade show in Las Vegas was a tremendous success as...
View ArticleGroup-IB takes part in a global operation to cripple Canadian...
SINGAPORE, April 18, 2024 /PRNewswire/ — Group-IB, a leading cybersecurity company aimed at investigating, preventing, and fight digital crime announced today that it participated in a coordinated...
View ArticleDataTracks Celebrates Completion of 19 Years
SINGAPORE, April 18, 2024 /PRNewswire/ — DataTracks, a provider of cloud-based software to automate/generate compliance reports for filing with financial/security regulators to more than 28,000...
View ArticleSecurity risks from IT/OT convergence threaten North Asia’s Industry 4.0...
2024 will see 50 per cent of Operational Technology (OT) systems connected to corporate IT systems in North Asia, up from 38 per cent in 2023. Only 13 per cent surveyed are at an advanced level of...
View ArticleReal estate logistics provider GLP steps up to zero trust architecture
With its physical and digital footprint growing, the global firm’s outdated legacy security stack has been replaced with AI-based cloud-centric platforms When a global real estate logistics provider...
View ArticleWhen GenAI chatbots start pretending to be stupid to gain human trust…
This may be a signal that the limited human intellect, in trying to play God, may be underestimating Pandora’s box In a recent peer-reviewed PLOS ONE research paper on large language models (LLMs) for...
View ArticleMore RATs discovered in official Android app store
Cybercriminals have been modifying open source remote access trojans (RATs) for embedding into seemingly legitimate apps to infiltrate “trusted” app stores Do not take for granted that apps from...
View ArticleDEEPX Expands First-Generation AI Chips into Intelligent Security and Video...
Award-winning on-device AI chipmaker will pursue key industry partnerships to bolster this expansion; following a strong showing at ISC West, it will continue this momentum at Secutech Taipei, Embedded...
View ArticleIntelligent Living Application Group Inc. Granted Extension to Meet Nasdaq...
HONG KONG, April 20, 2024 /PRNewswire/ — Intelligent Living Application Group Inc. (NASDAQ: ILAG) (“Intelligent Living” or the “Company”), a premium lockset manufacturer in Hong Kong, announced today...
View ArticleLarge language models have their strengths and weaknesses: analysis
In a balanced testing process, one widespread LLM has been evaluated for vulnerabilities and strengths, to demonstrate no room for complacency In an extension evaluation process of Meta’s LlamaV2 7B...
View ArticleHow much of automated internet traffic contains malicious activity?
One cybersecurity firm’s 20234 global bot activity data can shed some light on this area of growing concern In analyzing data on automated bot traffic from its customer protection ecosystem, one...
View ArticleAI vulnerability testing: Knowing the In’s and Out’s of proper red teaming
To test the safety/security of a generative AI feature, what unchartered bugs and human testing parameters are we dealing with? In the world of AI testing, “red teaming” for safety issues focuses on...
View ArticleDoes using the fear factor encourage people to be more cyber vigilant?
Is it better to use inclusiveness and positive reinforcement when educating the young about the need to be cyber vigilant? What motivational drivers influence individuals’ attitudes towards certain...
View ArticleAEWIN Presents Performant Hardware Solution with the Best TCO for AI-Powered...
TAIPEI, April 22, 2024 /PRNewswire/ — AEWIN Technologies Co., Ltd (doing business as AEWIN) will present performant hardware solution with the best TCO for AI-powered cybersecurity at RSA Conference...
View ArticleHow medical devices manufacturer Tuttnauer protects patient and personal-data...
In running a cloud-based portal to link its smart medical equipment, the firm has also implemented third-party end-to-end cybersecurity vigilance The advent of smart and connected medical devices has...
View ArticleVeritas Strengthens Cyber Resilience with New AI-Powered Solutions
Launches industry’s first self-defending data protection solution Announces new AI-powered copilot Expands Veritas 360 Defense with new security partners SINGAPORE, April 24, 2024 /PRNewswire/ —...
View Article
More Pages to Explore .....