article thumbnail

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday

Thales Cloud Protection & Licensing

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday josh.pearson@t… Tue, 11/26/2024 - 08:01 As Black Friday and Cyber Monday loom, the stakes for retailers extend far beyond enticing deals and record sales. trillion, the risk of a data breach extends beyond immediate financial losses.

Retail 71
article thumbnail

Google's AI Trends Report: Key Insights and Cybersecurity Implications

SecureWorld News

One of the report's most pressing concerns is the role of Generative AI in social engineering attacks. From the report: "Generative AI is being used to create highly convincing phishing emails, fake voices, and even deepfake videosmaking social engineering attacks more difficult to detect.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Dilemma: Emerging Tech as Cyber Risk Escalates

Trend Micro

Move faster than your adversaries with powerful purpose-built XDR, cyber risk exposure management, and zero trust capabilities Learn more Extend Your Team Extend Your Team. Respond Faster. Respond Faster. 6 Alerts Back Unread All Inside the criminal mind: Trend’s deep dive into cybercrime.

article thumbnail

Romantic Lawsuit for Two? Don't Let Cybercriminals Scam You this Valentine's Day

SecureWorld News

Protect your personal information Valentine's Day scammers take advantage of social engineering and people letting their guard down around February 14th. "Wire transfers are instantaneous and almost impossible to reverse, prepaid gift cards offer weak security measures, and there are private key vulnerabilities when paying by crypto.

Scams 80
article thumbnail

Cybersecurity in Aviation: Rising Threats and Modernization Efforts

SecureWorld News

Additionally, a distributed workforce, ranging from remote maintenance technicians to cabin crews, multiplies entry points for social-engineering tactics like phishing. Aircraft themselves are nodes on data networks, constantly transmitting telemetry, engine performance metrics, and passenger connectivity data.

article thumbnail

Why I Refused to Say “People Are the Weakest Link in Cyber”

Jane Frankland

The UK Government’s refreshed Cyber Governance Code of Practice sets a clear direction with guidance, and is holding boards accountable for human cyber risk. I’m approaching this from my role with OutThink , the Cybersecurity Human Risk Management platform I proudly represent as an advisor and brand ambassador.

article thumbnail

GUEST ESSAY: Ponemon study warns: AI-enhanced deepfake attacks taking aim at senior execs

The Last Watchdog

As AI technology advances, attackers are shifting their focus from technical exploits to human emotions using deeply personal and well-orchestrated social engineering tactics. Monitor their personal devices and home networks: Proactively identify and mitigate potential cyber risks.