5 Ways to Spot and Avoid Deepfake Phone Scams

As AI technology advances, the rise of deepfakes poses an ever-evolving threat. These manipulated images, videos, and audios use artificial intelligence to create convincing but false representations of people and events. Of particular concern is voice spoofing, also known as voice cloning, which uses AI to create a realistic-sounding recording of someone’s voice. Fraudsters have…

Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App

Jun 05, 2023Ravie LakshmananZero Day / Cyber Attack Microsoft has officially linked the ongoing active exploitation of a critical flaw in the Progress Software MOVEit Transfer application to a threat actor it tracks as Lace Tempest. “Exploitation is often followed by deployment of a web shell with data exfiltration capabilities,” the Microsoft Threat Intelligence team…

The Cost of Supply-Chain Cyberattacks

I have been writing about the supply chain—and cybersecurity—for decades, warning that we needed the right technology—and the right security protocols—in place to make our supply chains resilient and more secure. Seriously, for those of you who follow this column, you must be saying I sound like a broken record. I know what the heck…