AI & ML Article Cybersecurity ECS Educational News NIS2 Security TISAX

NIS2 Fulfillment through TISAX Assessment and ISA6

ENX has released an interesting article about how NIS2 requirements map to TISAX requirements. For this, there is a short introductory article called “TISAX and Cybersecurity in Industry – Expert Analysis Confirms NIS2 Coverage” and and a full article of 75 pages : https://enx.com/TISAX-NIS2-en.pdf An analysis conducted within ENX’s expert working groups examined how well […]

Antivirus Cybersecurity Educational News

Google Ads for Bitbucket.org – malvertising at its best (Updated)

  What is it? Malvertising : Malware delivered through  Advertising. These corrupted ads are designed to appear legitimate but they may serve malicious code, which can infect a user’s device simply through viewing or clicking on the ad. Malvertising exploits the expansive reach and complex supply chains of online advertising networks, enabling attackers to deliver […]

AI & ML Article Cybersecurity ECS Educational General News privacy Security

Balancing functionality and privacy concerns in AI-based Endpoint Security solutions

The integration of Artificial Intelligence (AI) in endpoint security has revolutionized the way organizations protect their devices and data. Ok, let’s take a break here: have you read the article about Artificial Intelligence vs. Machine Learning ?   By leveraging AI and machine learning models that analyze user behavior on devices, organizations can detect anomalies […]

Automotive Cybersecurity ECS IoT News

Strengthening the Security of Embedded Devices

Embedded devices are specialized computing systems designed to perform specific tasks or functions within a larger system. Unlike general-purpose computers, embedded devices are typically integrated into other devices or systems and are dedicated to carrying out a specific set of functions. They are often characterized by their compact size, low power consumption, and optimized performance […]

Antivirus Cybersecurity ECS General News

Preventing Attacks and Securing the Supply Chain in the Security Software Industry

The security software industry plays a vital role in safeguarding sensitive data and protecting digital infrastructure. However, the industry itself faces a significant threat from supply chain attacks. Supply chain attacks occur when cybercriminals target vulnerabilities within the supply chain to compromise software or hardware products before they reach the end-users. By infiltrating the supply […]

News Phishing

Targeted Phishing: Your auth password for [ user@host.com ] expires today !

It’s been a while since I received a targeted phishing. This time it is on one of my email accounts hosted on Google, and strangely, their phishing filter did not catch this one.     ITNotification <ITNotices@mail.com>  sorin@mustaca.com Expiration Your Password for sorin@mustaca.com has expired today. You can change your Password or continue using current Access   KEEP PASSWORD  ->erased domain on geocities.com   sorin@mustaca.com Admin. 2023 […]

General News

Takeovers in the IT-Security Industry

I just sow a post by AV-Comparatives called  “AV-Comparatives Explains the Implications of Takeovers in the IT-Security Industry” The entire article is very interesting and it is worth reading. And it is also objective and valid as well! Great job, AV-Comparatives! What made me write this post is the graphic at the end of the […]