More fraudsters are using artificial intelligence to generate “Frankenstein faces” for use in synthetic identity fraud. Kathleen Peters of Experian outlines this disturbing development in fraudster behavior, as outlined in a new report.
Once a catalogue merchant, The Very Group is now one of the UK’s largest digital retailers. And with transformation came significant cybersecurity challenges. Michael Duncan of The Very Group and Hitesh Sheth, CEO of Vectra AI, discuss the path to automated threat detection and response.
In an eBook with ISMG,...
Digital wallets, super apps and digital IDs all have substantial roles in the new consumer landscape. And identity proofing is critical for the fraud-prevention success of each of these emerging technologies, says Shai Cohen of TransUnion.
Four years ago, it was argued that software would replace Tier One Security Analyst roles across the industry. But at Secureworks, we view the infusion of automation into the SOC differently. Kevin Hanes, Secureworks' Chief Operations Officer, believes the SOC of the future will bring together the best of data science...
Four years ago, it was argued that software would replace Tier One Security Analyst roles across the industry. But at Secureworks, we view the infusion of automation into the SOC differently. Kevin Hanes, Secureworks' Chief Operations Officer, believes the SOC of the future will bring together the best of data science...
The new year has kicked off with a flurry of data security company acquisition activity; five deals have already been announced. Companies making acquisitions are striving to improve their secure access service edge - or SASE - posture, enter new markets or bolster their technology portfolios.
Many companies claim to be successfully using artificial intelligence for security, but the use cases are still not convincing because the technology is incapable of detecting unknown malware, says Guy Sheppard of SWIFT.
First you had 'shadow IT,' then 'shadow cloud.' Now enterprises are encountering 'shadow APIs' - and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.
In this eBook learn how organizations can achieve cyber resilience in an increasingly digitized world. Gain quick tips on how to get the board’s attention and approval on CyberSecurity investments. And finally, deep dive into how to combat cyberattacks effectively with a CyberSecurity Incident Response Program.
Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of Things (IoT), bring-your-own-device (BYOD) and cloud initiatives have given hackers new ways to infiltrate your organization by exponentially expanding the attack surface. Technologies like artificial...
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada.
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
With polymorphic attacks making up more than 40% of phishing campaigns designed to grab user credentials, the stakes are high for organizations around the globe. For many cybersecurity teams who lack bandwidth, finding the full scope of these attacks to quarantine is challenging and time consuming. Even worse,...
The Cofense Intelligence Team analyzes millions of emails and malware samples to understand the phishing landscape. Our most recent Phishing Review highlights tactics, techniques and procedures of attackers in July-September 2020, observed by our Cofense Intelligence team.
Download Cofense's Quarterly Phishing Review...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.