10 AI-Enhanced Cyber Crimes to be Concerned About

A study on AI by the Dawes Centre for Future Crime at UCL, ranks cybercrimes by harm, profit, achievability, and difficulty to defeat. From Voice-Cloning to Large-Scale Blackmail, explore high-concern AI-enhanced crimes of the future.
Vishing: 3 Examples of How Voice Cloning is Making it Easier Than Ever

Three shocking cases of AI voice cloning and vishing attacks: from celebrity deepfakes to a $35 million heist, exposing the risks of these cyber threats and how social engineering is being used to deceive and scam people and corporations. Additionally, know how to raise awareness and prepare employees.
Recession and the Role of Cybersecurity

A looming recession increases risks of attacks and scams. Why you should take the pro-active route and turn cybersecurity into an investment, not a cost.
Case study: How a Man-in-the-middle attack caused over $700 million in losses!

Criminals exploited a patched vulnerability to deploy a man-in-the-middle attack to gain access to multiple databases of one of America’s biggest credit reporting agencies and steal the personal information of 147 million citizens
Cybersecurity Awareness Month Special: Cybersecurity by the Numbers

This cybersecurity awareness month, et a clear picture of the digital landscape with 2023’s most unsettling cybersecurity statistics: frequency of attacks, costs, contention time, most dominant threats, the role of employees, and much more.
Annual Cybersecurity Training vs. Year-Round Cyber Security Awareness: Which is Better?

I have worked for not one, but three Fortune 500 companies, and the approach to cybersecurity training is typically as follows: Once the training is over, you drag yourself back to the office, and by the time you’ve sat down, it feels like half of all that information is GONE! A Snapshot of Traditional Cybersecurity […]
Look-alike domains: a Sneaky Cybersecurity Threat

Deceptively simple and almost imperceptible: look-alike domains are designed to trick the user’s eyes by mimicking URLs of trustworthy websites. After luring the prey into a fake website, the foundation for a series of other cyber threats is established. The domain can be used to create a phishing website or even launch attacks such as […]
Summer is here: how employees should prepare for a cyber-safe vacation

Plan for a cyber-safe summer vacation with our comprehensive guide. Learn about preventive measures to secure your electronic devices and protect your data while traveling. Learn how to create a cyber-safe summer checklist today.
The Evolution of the CISO

The article discusses the changing role of the CISO, highlighting the importance of balancing business strategy and cybersecurity, and exploring future trends in the profession.
The good old days: cybersecurity awareness used to be so much simpler

The article explores the evolution of cybersecurity awareness, highlighting how awareness strategies have needed to adapt to the increasing complexity and sophistication of cyber threats.