Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Deepfake Cyber Fraud Attacks: Risks, Examples, and Prevention

Artificial Intelligence (AI) has been a revelation. It has changed the way things are done. AI is being used in almost every industry because it speeds up the ability to perform tasks and reduces the chance of errors. But there is a dark side to this highly advanced technology. Scammers are using AI to create sophisticated attacks and are achieving success with them. Deepfake cyber fraud attacks are one such type where malicious actors use deep learning techniques and AI to manipulate existing media.

New BlackForce Phishing Kit Bypasses Multifactor Authentication

Zscaler has published a report on a new phishing kit dubbed “BlackForce” that uses Man-in-the-Browser (MitB) attacks to steal credentials and bypass multi-factor authentication. Notably, the kit “features a vetting system to qualify targets, after which a live operator takes over to orchestrate a guided compromise.” Additionally, the phishing kit uses mostly legitimate code in order to avoid detection by security scanners.

Do you still need wildcard certificates?

You’ve used wildcard certificates for years. It made your life easier. Once a year you’d renew your wildcard certificate, and copy it around to all the servers. It was way too complicated and expensive to get a unique certificate for every system. But now certificate lifetimes are shrinking to 47 days by 2029 and it’s not going to work anymore. You need to automate your certificates. Soon.

Threat hunting with Olly

Effective threat hunting requires both comprehensive visibility and quick, data-driven insights. Olly, the AI-powered observability teammate within Coralogix, provides just that. Whether you’re tracking lateral movement, uncovering stealthy persistence, or correlating spikes in anomalous activity, Olly rapidly pinpoints the evidence and presents it in context so you can confirm or dismiss threats before they escalate.

The Hidden Costs of Building Your Own Data Masking tool

Building an in-house data masking tool often starts as a practical decision. The logic feels sound. Your team understands the data, knows the systems, and can tailor masking logic exactly to your needs. On the surface, it looks like a short engineering project that saves licensing costs and avoids external dependencies. What we’ve learned, after observing many organizations take this path, is that the hidden costs of building your own data masking solution rarely appear during the initial build.

Why Preserving Data Structure Matters in De-Identification APIs

When it comes to data masking or de-identification, one often-overlooked detail is the importance of preserving the original data structure. While it might seem harmless to normalize extra spaces or convert unique newline characters into a standard format, these subtle changes can actually have a significant impact on downstream processing. Let’s explore why this matters, with a couple of concrete examples.

Expert Roundup -How to Prepare for AI Data Processing Under GDPR?

As AI adoption accelerates across business functions, December’s expert roundup focuses on a question many organizations are now confronting in practice rather than theory: how should companies prepare for AI related data processing under GDPR. Unlike traditional automation, AI systems often rely on large, dynamic datasets, continuous learning, and opaque decision logic.

How Appknox reporting and analytics make security data usable across teams

Security reporting only works when the right people can use it. Appknox reporting and analytics are designed to help security leaders, AppSec teams, and developers work from the same data—without translation layers or manual fixes—so teams can meet targets for report delivery and act faster.

Bitsight Threat Intelligence Briefing: Top TTPs Leveraged by Threat Actors in 2025

As the global cyber threat landscape evolves, adversaries continue to refine and adapt their tactics. Bitsight threat intelligence indicates that there are several tactics, techniques, and procedures (TTPs) that are most commonly and consistently leveraged by threat actors. These attacks are not isolated; they’re systemic.

DevOps Credential Hygiene: How to Eliminate CI/CD Secrets with Teleport

Static credential practices — where certificates, keys, and tokens persist for months or years and are manually rotated — create systemic risk in DevOps pipelines. Rotating these secrets is time-consuming and costly. In fact, organizations may spend dozens of hours and involve multiple teams to rotate a single credential. Manual rotation quickly becomes impractical across thousands of service accounts. In this post, you will learn.