‘FraudGPT’ Malicious Chatbot Now for Sale on Dark Web
Before we get started with “FraudGPT” and “WormGPT,” we have written several posts on the threat of AI-driven attacks, which have been several of our most downloaded and read blog
The Use of Artificial Intelligence in Cyber Attacks and Cyber Defense
Artificial Intelligence or AI has ushered in a new era of technological advancement, with transformative effects in domains like healthcare and transportation. But perhaps nowhere is its impact more pronounced
Four Artificial Intelligence Threats Will Challenge the Cybersecurity Industry
Artificial intelligence (AI) and machine learning (ML) systems are becoming increasingly popular, especially with the advancements of OpenAI’s ChatGPT and other large language models (LLMs). Unfortunately, this popularity has led
The 16 Major Types of Malware – Defined
Malware is an ever-rising threat to information technology security. With the introduction of advanced techniques and tactics, malware has quickly become a significant risk for any business's online infrastructure. Understanding
Defense Technologies Shaping Cybersecurity
Many people assume that cybercrime is a concept that’s only become a threat to businesses and individuals in the last decade. However, the seeds of cybercrime were sown back in
Malware: Old Tools; New Tricks
Since the earliest form of a computer virus was created in 1949, malware has certainly come of age. Malware continues to wreak havoc on corporate and government entities and remains
INTERPOL – Cybercrime Increasing at “Alarming Pace”
The State of Cybersecurity in 2020 This blog post is geared to provide a clear picture of the State of Cybersecurity in 2020 according to leading research groups and cybersecurity authorities.
How Companies Use CIS 20 to Secure Remote Workers
Using CIS Controls 1-6 to Secure Your Remote Employees As we in the industry have documented consistently, Cyber-attacks continue to grow in sophistication and damage particularly over the past several months.
Stopping Coronavirus Cyber-Scams Before They Start – Part 2
How to Identify Coronavirus Cyber-Attacks – Part 2 In our first post concerning Corona Virus cyber-scams named “How to Identify Corona Virus Cyber-Attacks,” we wanted to warn our customers and readers