Remove Big data Remove Phishing Remove Technology
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. “SonarX served as an easily searchable repository for social media data that previously had been obtained by CHENGDU 404.” Security analysts and U.S. Image: DOJ.

Antivirus 363
article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

Slow communication can also leave workers vulnerable to phishing attacks, where cybercriminals pose as legitimate authorities. Since phishing makes up 30% of all attacks against small businesses, this is a pressing concern. Look to see if any of these risks apply to your remote workers so you can take action and protect them.

Internet 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s Cybercriminals Profit From Underground Data Monetization

Security Boulevard

Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise.

Big data 119
article thumbnail

News alert: Criminal IP and Quad9 collaborate to exchange domain and IP threat intelligence

The Last Watchdog

May 13, 2024, CyberNewsWire — Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address to protect users by blocking threats to end users. Torrance, Calif.,

DNS 130
article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. In 1971, researcher Bob Thomas and his team at BBN Technologies created a virus that was later coined the “Creeper” worm.

Hacking 140
article thumbnail

Top 5 Risks of Artificial Intelligence

IT Security Guru

Artificial intelligence (AI) technology functions in a manner that helps ease human life. Through AI-enabled systems, different industries have been able to minimize human error and automate repetitive processes and tasks while smoothly handling big data. Discussed below are the top five risks of artificial intelligence.

article thumbnail

Data Philosophy and Technology Combine for Better Endpoint Security

Security Boulevard

When Ackoff wrote his article, computing technology was at the cusp of data and information. With the advent of advanced tools like big data analytics and artificial intelligence, one might make a bold statement that today, computing technology straddles the gap between information and knowledge. Ackoff, R.