Playing games, getting hacked
High-volume transactions and enthusiastic users mean gaming platforms are vulnerable to phishing, infostealers, and DDoS disruption
Read MoreHigh-volume transactions and enthusiastic users mean gaming platforms are vulnerable to phishing, infostealers, and DDoS disruption
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreResearchers have found a new chatbot attack that uses prompt injections to steal personal data from users.
Read MoreAI companies scrape the internet for content to train their generative AI models. Here are some of the ways you can opt out of allowing your data to be ingested by AI.
Read MoreWe take a quick look at major cybersecurity funding rounds and key investment trends in 2024.
Read MoreOpen-source cybersecurity projects are more important than ever. Find out how open-source solutions are enabling quantum-resistant security, advanced threat detection, and security-first software development.
Read MoreVC firms have a growing responsibility for innovation and the diversification of technology in cybersecurity, with the power to enable a resilient security landscape in the future.
Read MorePhysical entry points: Why cybersecurity isn’t just digital.
Read More