Tag AI

Microsoft Halts Use of China-Based Teams for Department of Defense Support

Microsoft has recently decided to cease using engineering teams based in China for the support of the Defense Department’s cloud computing systems. This decision follows an investigation by ProPublica, which raised concerns among cybersecurity experts about potential vulnerabilities to hacking and espionage. While this action directly addresses the Defense Department,…

Read MoreMicrosoft Halts Use of China-Based Teams for Department of Defense Support

AI vs. Deception: Battling Fakes, Fraud, and Data Integrity

Luxury Brands Face Rising Threats from Counterfeiting and Cyber Attacks: How AI is Their Silent Protector In an era where counterfeit goods and fluctuating trends pose significant challenges, luxury brands are increasingly focusing on preserving their prestige and uniqueness. The luxury market is facing unprecedented challenges as counterfeiters adopt advanced…

Read MoreAI vs. Deception: Battling Fakes, Fraud, and Data Integrity

US Infrastructure Still Vulnerable 15 Years After Stuxnet Attack

Critical Infrastructure Security, Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Experts Warn That Critical Infrastructure Sectors Are Falling Behind in Cybersecurity Chris Riotta (@chrisriotta) • July 22, 2025 Panelists informed a congressional subcommittee that Iranian threat actors are exploiting vulnerabilities in U.S. operational technology. (Image: Shutterstock) Despite initial advancements…

Read MoreUS Infrastructure Still Vulnerable 15 Years After Stuxnet Attack

Are Retailers Taking Adequate Measures to Prevent Cyberattacks?

Recent months have seen a significant surge in cyberattacks targeting well-known retailers, including Marks & Spencer, Harrods, and Victoria’s Secret. This alarming trend has prompted industry experts to advocate for heightened investments in cybersecurity and digital resilience among retail brands. The vast online presence of these companies, coupled with the…

Read MoreAre Retailers Taking Adequate Measures to Prevent Cyberattacks?

Darktrace Acquires Network Traffic Monitoring Company Mira Security

Network Detection & Response, Security Operations Startup Mira Security to Provide Insights on Encrypted Network Traffic and Decryption Michael Novinson (MichaelNovinson) • July 21, 2025 Darktrace has acquired Mira Security, a startup specializing in network traffic visibility, to enhance insights on encrypted network traffic for enterprises in regulated sectors. The…

Read MoreDarktrace Acquires Network Traffic Monitoring Company Mira Security

Mastering Data Security in Financial Services: Navigating the Hyper-Regulated Landscape – Webinar

Cloud Security Risks for Financial Institutions: Insights from Protegrity Webinar In an era marked by rapid digital transformation, financial institutions are increasingly transitioning to the AWS Cloud. This shift comes with heightened challenges for leaders in risk management, compliance, data governance, and cybersecurity. They face immense pressure to safeguard sensitive…

Read MoreMastering Data Security in Financial Services: Navigating the Hyper-Regulated Landscape – Webinar

China’s Salt Typhoon Hackers Infiltrated the US National Guard for Almost a Year

Recent reports highlight significant cybersecurity incidents, underscoring ongoing concerns about data privacy and system vulnerabilities. A notable case involves an analysis of the FBI’s Jeffrey Epstein prison video, which indicates that roughly 2 minutes and 53 seconds of footage may have been edited out. While there’s no evidence of deceptive…

Read MoreChina’s Salt Typhoon Hackers Infiltrated the US National Guard for Almost a Year

Hackers Discover Innovative Methods to Conceal Malware within DNS Records

Cybersecurity researchers have uncovered a new tactic employed by hackers to conceal malware within domain name system (DNS) records, a method that poses significant challenges for traditional defense mechanisms. This technique exploits the mapping of domain names to their respective numerical IP addresses, allowing malicious scripts to operate stealthily. Recent…

Read MoreHackers Discover Innovative Methods to Conceal Malware within DNS Records

Trump Eases Nvidia Chip Restrictions on China, Sparking Concerns

Artificial Intelligence & Machine Learning, Government, Industry Specific Analysts Warn White House Chip Policy Reversal Poses Risks to US AI Leadership Chris Riotta (@chrisriotta) • July 15, 2025 President Trump has reportedly lifted restrictions on certain chip exports to China that were initiated in 2022. (Image: Shutterstock) President Donald Trump’s…

Read MoreTrump Eases Nvidia Chip Restrictions on China, Sparking Concerns