Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Android Malware Platform Targets Bank Accounts

Researchers at Zimperium are tracking a new malware-as-a-service platform designed to target Android phones with banking Trojans. The platform, dubbed “Fantasy Hub,” allows unskilled threat actors to launch sophisticated malware campaigns that trick victims into granting access to their bank accounts.

Building human-centric SOCs in the age of AI automation with Alec Fenton

Defender Fridays - Building human-centric SOCs in the age of AI automation with Alec Fenton Join us for this week's Defender Fridays as we explore the evolution of security operations and AI's role in empowering analysts with Alec Fenton, VP Security Operations at Foresite Cybersecurity. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

WAN AI vs Other AI Video Generators: Which Is Best?

In the world of artificial intelligence (AI) technology, video generators have become increasingly popular for creating stunning visual content. One of the most talked-about AI art generators is WAN AI, which promises to revolutionize the way we create and share videos. But how does WAN AI stack up against other AI video generators on the market? Let's take a closer look at the features, capabilities, and benefits of WAN AI compared to its competitors.

Turn PDF Contracts into Editable Word Documents for Quick Modifications

PDFs are a popular format for sharing contracts, agreements, and official documents due to their consistent formatting and universal accessibility. However, when it comes to making modifications, PDFs can sometimes be complicated. This is particularly problematic for businesses and professionals who frequently work with contracts, as the process of making revisions can be slow and inefficient.
Featured Post

Cyber Resilience and AI Risk: Safeguarding the UK's Critical Infrastructure in a New Threat Landscape

In October, the UK put a spotlight on cyber resilience with the release of the NCSC's 2025 Annual Review. CEO Richard Horne warned that failing to prepare for cyberattacks risks a company's future. The urgency behind this statement is backed by data: the NCSC handled 204 major cyber incidents between September 2024 and 2025, and 43% of UK businesses reported a breach in the past year.

How Are Cyber Security Companies Managing AI Attacks?

AI attacks pose real risks for companies because of their ability to scale and automate attacks like brute force attacks, smarter malware, deep fakes and advanced phishing. Attacks that were once slow, manual and easy to spot are now becoming faster, more sophisticated and harder to detect. UK government research shows that 32% of UK businesses have experienced a cyber attack in the last year, and experts warn that AI could make this number rise significantly.

Adopting cold-war tactics for AI deep fakes?

The AI arms race in deepfake detection has a critical problem: the technology can't keep up. In this episode, Navroop Mitter, CEO of ArmorText, discusses why the industry is shifting away from relying on AI detection alone. A recent study from SKKU in South Korea found that zero out of sixteen top deepfake detection technologies could reliably identify deepfakes in real-world conditions. They worked fine in controlled lab settings, but failed when it mattered most.

Optimize Your Application Security with Custom WAF Rules

Your website is unique, and so are the attacks against it. Generic Web Application Firewall (WAF) rules protect everyone a little, but leave your site exposed to specialized attacks. Custom WAF rules are your line of defense against targeted threats—the ones tailored to your specific application, industry, or code base. Key Advantages of Custom WAF Rules.

The Silent Killers: 7 Examples of Mobile Device Security Risks

It’s easy to think about securing an organization’s data like building a bank vault. You focus on defenses that are impermeable to unauthorized parties: doors hardened against drills, walls resistant to impacts, and countermeasures for any number of other illicit access methods. Ultimately, you feel confident that only people with the right clearance will get in.