Remove Cyber threats Remove Data collection Remove Technology
article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

From generating deepfakes to enhancing phishing campaigns, GAI is evolving into a tool for large-scale cyber offenses GAI has captured the attention of researchers and investors for its transformative potential across industries. Unfortunately, its misuse by malicious actors is altering the cyber threat landscape.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to compliance

The Last Watchdog

It’s often difficult for small businesses to invest significantly in data privacy compliance or security measures because they don’t have large budgets. In fact, many SMBs have to choose between investing in new technology and making payroll. Data protection is an ongoing process.

article thumbnail

US Federal Judge Upholds Automakers' Right to Record Texts, Call Logs

SecureWorld News

The automakers argued that their practice was necessary to provide certain features and services, such as hands-free calling and texting, and that customers had consented to the data collection by agreeing to the terms of service when they purchased their vehicles. For the auto manufacturers involved, this is a significant victory.

article thumbnail

Threat Hunting with MITRE ATT&CK

IT Security Guru

The number of security technologies often results in fragmented data and hinders a comprehensive threat-hunting approach. Automated threat hunting has become a solution that can advance the capabilities of any security team. Each solution generates logs and alerts, creating data silos.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Understanding and adhering to cybersecurity regulations is crucial for any organization as cyber threats evolve and become more sophisticated. Cybersecurity laws and regulations encompass a range of legal requirements designed to protect information systems and data from cyber threats.

article thumbnail

Clarifying CAASM vs EASM and Related Security Solutions

NetSpi Executives

Organizations have a wealth of tools to manage cyber threats. But with names like CAASM, EASM, and DRPS, plus their overlapping or complementary capabilities, it can be a lot of work to understand how they differ, and which technologies are right for you. What is cyber asset attack surface management (CAASM)?

Risk 52