Five Eyes Agencies: SolarWinds Hackers Adopting New Tactics As businesses move to the cloud, hackers are adopting new techniques since Software as a Service providers are much better at patching than most companies are. Instead, the Russian hackers are stealing authentication tokens and using them to get access to the cloud, including creating new accounts […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Assuming you are like every other company, you communicate with people. People like employees, customers, suppliers and the media. Given what we are seeing, already, with deepfakes and the the fact that this is only just starting, what is your plan to protect your reputation? Would a competitor or someone else publish a photo, video, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As if yesterday’s deep fake post wasn’t enough to scare you, here is another one. Gartner says that attacks using AI-generated deepfakes to bypass facial biometrics will lead a third of organizations to doubt the adequacy of identity verification as standalone protections. Actually, this is good news because biometrics should ***ONLY*** be used to identify […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Even God is Into Crypto A Colorado based online pastor has been charged with selling worthless crypto. He said “the lord” told him to give his followers 10x return. He also said the lord told him to remodel his house with some of the money. I can’t make this stuff up. Credit: Coin Telegraph Feds […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Item 1 – Apple is reported to be in negotiations with news companies and other publishers (like NBC and Conde Nast) to “license” their back catalog of content for their AI projects. Apple is offering, supposedly, up to $50 million to license their content, but, at least for now, the content creators were not fans […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Low Code/No Code Apps Not A Security Nirvana Just because the computer is generating much of the code does not mean the software doesn’t have bugs or is secure. In fact, since many times non-developers are using the tools, the code may be less secure. Details at The Hacker News As If Twitter Doesn’t Have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]