Scammers use deepfakes to bypass biometric checks
Sophisticated deepfakes, screenshots, and face manipulation are the most common tactics cybercriminals use to trick facial authentication software.
Identification verification (IDV) services are becoming ever more popular, with forecasts putting...
New offering from DNSFilter targets shadow IT risks
A new list of high-risk applications commonly used in the enterprise and an offering to block their use has been released by a domain name security company. DNSFilter posted...
GitHub makes Advisory Database public to improve software supply chain security
Software development platform GitHub has made its Advisory Database open to community contributions allowing anyone to contribute insight and intelligence on security vulnerabilities to help improve software supply chain...
Scammers lure Signal users into a trap with fake cash prizes
Scammers are attacking Signal users with an urgent request to accept a cash prize to harvest credit card information.
"Your number is one of the top Signal users. You are...
Cyber adversaries kept pace in 2021 and moved beyond malware – CrowdStrike
Ransomware-related data leaks increased by 82%. The threat landscape has become even more crowded as new adversaries emerged.
Adversary tradecraft has grown more sophisticated, CrowdStrike claimed in its new Global...
US crypto agency names first director
Eun Young Choi will lead the National Cryptocurrency Enforcement Team (NCET) in identifying, investigating, supporting, and pursuing the Justice Department's cases involving the illegal use of digital assets.
She will...
CISA publishes a list of free cybersecurity tools and services
CISA (Cybersecurity and Infrastructure Security Agency) has compiled a list of free cybersecurity tools and services to help organizations reduce the likelihood of cyberattacks.
The list includes cybersecurity services provided...