What threats are you missing?
Are traditional security methods enough?
Stay up to date with the SecureValue Blog
Most Recent Articles
Finally! Facebook and Messenger are getting default end-to-end encryption. And not everyone is happy…
It’s taken a while, but it finally looks like end-to-end encrypted conversations
are going to become a reality for users of Facebook and Messenger.
In a blog post
Improvements The live chat bubble has been relocated to the left side of the screen. In order for this change to take effect, you might need to uninstall the previous VM Backup version manually and reinstall the version 220.127.116.11. This will not have any impact on your configuration. A rare error which was causing immutable backups […]
The festive season is in full swing, filled with joy and the spirit of giving.
However, lurking in the shadows are unseen cyber threats waiting to take
advantage of this time of the year, your goodwill, and the joy you bring to
those around you.
This month’s report highlights a decline in sophisticated email threats but a rise in easily detectable threats. Microsoft fixed 63 vulnerabilities, including five zero-days, urging prompt fixes. Major CPU vulnerabilities in Intel and AMD pose risks, but patches are available.
Der Beitrag Monthly Threat Report December 2023: Holidays Bring Malicious Email and Lots of Patches to Apply erschien zuerst auf Hornetsecurity.
Foreign governments are spying on civilians through notifications received on
their smartphones, according to a US senator.
In a letter to the US Department of Justice, Senator Ron Wyden said his office
received a “tip” about a year ago that governmen…
The British government has rebutted claims that the Sellafield nuclear site has
been subject to cyberespionage by foreign hackers.
On Monday, The Guardian reported that Sellafield
[https://en.wikipedia.org/wiki/Sellafield] – which reprocesses nuclear …
Deepfakes: what they are, how they work and how to protect against malicious usage in the digital age
What are deepfakes?
Deepfakes are synthetic media (photos, videos and audio recordings) created
using artificial intelligence (AI). In the most common scenarios, real data is
manipulated to create highly convincing content that can be very hard to
An unusual attack tool has caught the attention and peaked the curiosity of G DATA analyst Hendrik Eckardt. The discovered RAT (Remote Access Tool) is apparently designed for networks where people take an annoyingly close – for the attackers – look at …