HomeTechnology

Technology

Denodo

 

Silent Hijack: Rogue 5G Networks Compromising Aircraft Communication

Although there are many advantages to integrating 5G technology into aviation communication systems, there are also significant risks. Rogue...

Shared Services VPN Compromise Leads to Cross-Business Data Exposure

Introduction In recent times, the integrity of shared services has become increasingly crucial for businesses around the globe. Unfortunately, the...

AI-Powered Supply Chain Attack: Manipulated AI in Just-In-Time (JIT) Manufacturing

We have been witnessing technological disruption almost every decade, be it the Internet burst, Cloud computing or the recent...

Customer Shipment Tracking Data Exposed via Unsecured API Endpoint

Scenario & Impact: When Convenience Turned Into Exposure In India’s fast-moving logistics industry, real-time shipment tracking has become standard. However,...

Behavioural Biometrics as a Compliance Engine: Identity Assurance for AI Accountability

With advancing generative AI in important industries, the demand for protecting its deployment with strong guidelines is becoming stronger....

Privacy in the world of AI – fallacy or reality?

“Data is the new Oil” – this has been a (cliched) reality for over 2-3 decades now. Now, with...
- Advertisement -

The Silent Bridge & The Hidden Risk: Unmasking the Unseen Path of Lateral Movement via Misconfigured VDI...

In today’s boundaryless enterprise, where remote work is not just a trend but an operational mainstay, Virtual Desktop Infrastructure...

Scenario Overview, Business & Technical Impact, Risk Exposure

In a sensitive case of insider data theft, a high-ranking HR administrator at a payroll service provider illicitly copied...

The AI-Powered Recruitment Fraud: Deepfake Candidates Exploit Remote Hiring Processes

Imagine a scenario where an IT services firm rapidly expands its global footprint through remote hiring—only to be blindsided...

Guarding against the invisible: Tackling AI model poisoning in financial fraud detection

Artificial Intelligence (AI) has transformed fraud detection in finance, enabling real-time transaction monitoring and faster fraud prevention. However, as...
 
 
error: Content is protected !!

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch