Critics — which include the US embassy in Zambia — contend the just-signed Cyber Security Act and the Cyber Crime Act allow suppression of dissent and too much concentration of power.
Рубрика: Без рубрики
Secure Communications Evolve Beyond End-to-End Encryption
Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make secure communications more private.
Hoff’s Rule: People First
Dark Reading Confidential Episode 5: Christofer Hoff, chief secure technology officer at LastPass, shares the human side of the story of how he led his team through a major cyber incident and built from the ground up a security team and security culture.
When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts
In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.
3 Things to Know About AI Data Poisoning
Data poisoning represents the next big existential cybersecurity threat — unless organizations can ensure their AI systems are safe and trustworthy.
Microsoft 365 Accounts Get Sprayed by Mega-Botnet
The threat actors are exploiting non-interactive sign-ins, an authentication feature that security teams don’t typically monitor.
Thailand Targets Cyber Sweatshops to Free 1,000s of Captives
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity.
Insight Partners, VC Giant, Falls to Social Engineering
The start-up incubator and PR firm with holdings in more than 70 cybersecurity firms has announced a data breach with as-yet-unknown effects.
China-Linked Threat Group Targets Japanese Orgs’ Servers
Winnti once used a variety of malware, but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access.
How Public & Private Sectors Can Better Align Cyber Defense
With investment in cybersecurity capabilities and proactive measures to address emerging challenges, we can work together to navigate the complexities of combating cybercrime.