COMPUTER 2000 Bulgaria
Threat Actors Now Hacking into Companies via Search Ads

Threat Actors Now Hacking into Companies via Search Ads

For the past few years, hackers have increasingly targeted customers and businesses with tainted software boosted via ads. The recipe is simple – cyber-criminal groups set up fake websites for high-interest software and promote them on top of the results page through...
Britain to Host World’s First AI Safety Summit

Britain to Host World’s First AI Safety Summit

On Nov. 1 and 2 this year, the U.K. government will host the world’s first artificial intelligence safety summit in Bletchley Park, the home of the codebreakers who cracked the code that ended World War II. The reputable US media CNBC reports that the meeting will...
Revisiting Traditional Security Advice for Modern Threats

Revisiting Traditional Security Advice for Modern Threats

Modern attacks targeting supply chains, using zero-day exploits, and exploiting vulnerabilities in security appliances have been flooding newsrooms, boardrooms and threat reports in recent months. Some examples have been unique and interesting, including the 3CX...
Should You Opt to ‘Sign in with’ Facebook, Google, Apple?

Should You Opt to ‘Sign in with’ Facebook, Google, Apple?

A survey commissioned by Bitdefender showed that internet users had on average eight online accounts, spanning social media, online shops, video streaming, telecoms, utilities, booking, airlines and more. Today, that number is much higher as we consistently sign up...
5 Phases of a Successful AP Automation Project

5 Phases of a Successful AP Automation Project

Accounts payable (AP) departments are responsible for routing, distributing, signing, and storing documents. When completed manually, these processes consume employee time, waste a whole lot of paper, and create endless frustration. Automating AP with an integrated...
Mo Cashman, Trellix: Cyber Defence Must Secure Business Resilience

Mo Cashman, Trellix: Cyber Defence Must Secure Business Resilience

For this purpose, the organizations should apply a systematic approach. “AI-empowered solutions will become a vital part of an organization’s security architecture and teams”, says Mr. Mo Cashman, senior director for the EMEA region at Trellix. Covid...
Using Threat Hunting to Uncover Cybersecurity Threats

Using Threat Hunting to Uncover Cybersecurity Threats

What is Threat Hunting? Threat Hunting is a proactive cybersecurity practice that involves actively searching for advanced threats and malicious activities within an organization’s network. Unlike traditional cybersecurity measures that rely on pre-configured...