Security: Using AI for Evil

|
Like every tool, AI has the potential to be used for evil as well as good. Recent survey results show that 62% of cybersecurity experts believe weaponized AI attacks will start occurring within the next 12 months. So, how can the good guys keep the industry one step ahead in ... Read More

Memory-Based Attacks are on the Rise: How to Stop Them

|
Also known as 'fileless' or 'living-off-the-land' attacks, memory-based attacks work by getting instructions in or data out of the memory, rather than traditional focus areas such as the disk file directories or registry keys. In this blog, we investigate your options to prevent this type of attack ... Read More

Memory-Based Attacks are on the Rise: How to Stop Them

|
Also known as 'fileless' or 'living-off-the-land' attacks, memory-based attacks work by getting instructions in or data out of the memory, rather than traditional focus areas such as the disk file directories or registry keys. In this blog, we investigate your options to prevent this type of attack ... Read More