Posted inBlog News Behavioral Analytics in Cybersecurity: Who Benefits Most? Posted by By Mehmed Saleem 7 February 2025 COMMENTARYLast year, the cost of a data breach rose 10%, from $4.4 million to $4.8…
Posted inBlog News Cybercrime Forces Local Law Enforcement to Shift Focus Posted by By Mehmed Saleem 6 February 2025 Last November, an Idaho man was sentenced to 10 years in prison for hacking into…
Posted inBlog News 7AI Streamlines Security Operations With Autonomous AI Agents Posted by By Mehmed Saleem 6 February 2025 The co-founders of EDR provider Cybereason have regrouped with a new security startup, 7AI, to…
Posted inBlog News Researcher Outsmarts, Jailbreaks OpenAI’s New o3-mini Posted by By Mehmed Saleem 6 February 2025 A prompt engineer has challenged the ethical and safety protections in OpenAI's latest o3-mini model,…
Posted inBlog News US Cybersecurity Efforts for Spacecraft Are Up in the Air Posted by By Mehmed Saleem 6 February 2025 The cybersecurity of satellites, spacecraft, and other space-based systems continues to lag behind current threats,…
Posted inBlog News DeepSeek Phishing Sites Pursue User Data, Crypto Wallets Posted by By Mehmed Saleem 6 February 2025 More than two weeks after China's DeepSeek garnered worldwide attention with its low-cost AI model,…
Posted inBlog News Agencies Sound Alarm on Patient Monitors With Backdoor Posted by By Mehmed Saleem 6 February 2025 Last week, the Cybersecurity and Infrastructure Security Agency (CISA), alongside the US Food and Drug…
Posted inBlog News A Race You Can’t Win, but Must Run Posted by By Mehmed Saleem 6 February 2025 COMMENTARYCybersecurity is a relentless, brutal, and unwinnable race. It's a savanna where organizations are gazelles…
Posted inBlog News Basket of Bank Trojans Defraud Citizens of East India Posted by By Mehmed Saleem 6 February 2025 A series of fake banking apps are making the rounds in India, mimicking trusted institutions…
Posted inBlog News Abandoned AWS Cloud Storage: A Major Cyberattack Vector Posted by By Mehmed Saleem 5 February 2025 Abandoned cloud storage buckets present a major, but largely overlooked, threat to Internet security, new…