Truecaller AI Call Scanner detects AI voice clones in real-time

Three seconds! That’s how much of your voice an AI voice synthesizer needs to generate a complete clone of your voice. Illegitimate voice cloning and speech synthesis technologies are... Read more »

GMO GlobalSign introduces Certificate Automation Manager

GMO GlobalSign announced the rebranding of the company’s certificate automation product, Automated Enrollment Gateway (AEG), to Certificate Automation Manager. The renamed solution reflects the greatly increased capabilities introduced over... Read more »

How fraudsters stole $37 million from Coinbase Pro users

A convincing phishing page and some over-the-phone social engineering allowed a group of crooks to steal over $37 million from unlucky Coinbase Pro users. One of them – Chirag... Read more »

PoC exploits for critical FortiSIEM command execution flaws released (CVE-2024-23108, CVE-2023-34992)

Horizon3.ai researches have released proof-of-concept (PoC) exploits for CVE-2024-23108 and CVE-2023-34992, vulnerabilities that allow remote, unauthenticated command execution as root on certain Fortinet FortiSIEM appliances. CVE confusion FortiSIEM helps... Read more »

Dashlane Nudges reduces the risk of credential theft

Dashlane unveiled Dashlane Nudges, a new automated tool to empower admins to proactively create a more security-conscious workforce and drive better credential security behavior across their organization, reducing the... Read more »

Transcend raises $40 million to address data privacy issues

Transcend raised $40 million in Series B funding led by new investor StepStone Group, with participation from HighlandX and existing investors Accel, Index Ventures, 01 Advisors (01A), Script Capital,... Read more »

Avoiding the cybersecurity blame game

Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and controls, and fully implemented monitoring and review... Read more »

RansomLord: Open-source anti-ransomware exploit tool

RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. “I created RansomLord to demonstrate ransomware is not invincible, has... Read more »

Cybersecurity jobs available right now: May 29, 2024

Cloud Security Engineer – Secret Clearance Required Constellation West | USA | Remote – View job details As a Cloud Security Engineer, you will establish, execute, and sustain an... Read more »

A closer look at GenAI impact on businesses

This article includes excerpts from various reports that provide statistics and insights on GenAI and its impact on businesses. CEOs accelerate GenAI adoption despite workforce resistance IBM | IBM... Read more »
Subscribe to our Newsletter