Remove Cyber threats Remove Data collection Remove Risk
article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

From generating deepfakes to enhancing phishing campaigns, GAI is evolving into a tool for large-scale cyber offenses GAI has captured the attention of researchers and investors for its transformative potential across industries. Unfortunately, its misuse by malicious actors is altering the cyber threat landscape.

article thumbnail

GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to compliance

The Last Watchdog

A Data Privacy Impact Assessment, or DPIA , is a formal assessment of the privacy risks of your data processing activities. The purpose of conducting a DPIA is to identify and assess the potential impact of these risks on individuals’ rights and freedoms from your proposed processing operations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canada bans WeChat and Kaspersky apps on government-issued mobile devices

Security Affairs

Canada banned the Chinese messaging app WeChat and Kaspersky antivirus on government mobile devices due to privacy and security risks. The Government of Canada announced a ban on the use of the WeChat and Kaspersky applications on government-issued mobile devices due to privacy and security risks.

Mobile 138
article thumbnail

Amazon Alexa Skills Present Security Risks

eSecurity Planet

Researchers now believe that the rapid adoption of these skills could have implications for information security as they could open Alexa users up to phishing or invasive data collection. It may or may not come as a surprise to many users how little focus there is from Amazon on being transparent about how skills handle user data.

Risk 94
article thumbnail

IATA Cyber Regulations

Centraleyes

The IATA Cyber Security Regulations, often referred to as the “IATA Cyber Security Framework” (ICSF), focus on protecting the aviation ecosystem against cyber threats. Awareness and Training: Employees across all levels must be trained on cybersecurity best practices to minimize human-related risks.

Risk 52
article thumbnail

Over 100,000 ChatGPT Accounts Compromised by Cybercriminals

SecureWorld News

The company's Threat Intelligence platform detected more than 100,000 compromised devices with saved ChatGPT credentials traded on illicit Dark Web marketplaces over the past year. Info stealers are also indiscriminate, infecting as many computers as possible to maximize the amount of data collected.

article thumbnail

Clarifying CAASM vs EASM and Related Security Solutions

NetSpi Executives

Organizations have a wealth of tools to manage cyber threats. Let this quick guide be your roadmap to pinpointing the distinctions between cyber asset attack surface management (CAASM) and its closest counterparts. What is cyber asset attack surface management (CAASM)? Lost in a labyrinth of cybersecurity acronyms?

Risk 52