According to Netwrix, these following cyber security trends will be key as we enter 2023:
Professional Cybercrime - an expansion of cybercrime for hire. In...
Researchers found new critical vulnerabilities in various automotive giants such as Tesla, Ferrari, BMW, Toyota, and others. The researchers found a compromise in a...
Once digital property gains value in the virtual world, the risk of cyber-attacks, hacking, theft, ransomware and phishing will noticeably increase without proper cyber...
Recently, a report published by the US Department of Interior following an investigation by the Inspector General has showcased that 21% of the entire...
On August 25, 2022, LastPass published an official statement notifying customers that a third-party gained unauthorized access to portions of their development environment, source...
Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
Based on a published NCC (National Computing Center) whitepaper, the growing number of organizations creating and deploying machine learning solutions is highly concerning. The...
With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
While deep learning algorithms may be looking promising for identifying and characterizing cybersecurity intrusions, various attacks can cause them to provide inaccurate information, or...
Google has discovered a new commercial spyware that exploits vulnerabilities in Google Chrome, Mozilla Firefox, and Microsoft Defender. The Google Threat Analysis Group (TAG)...
By: Or Shalom, HLS expert
OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...
Researchers at the Indian Institute of Technology Madras have developed an innovative algorithm to mitigate disruptions in critical networks such as air traffic control...
While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...