detection

  • Blog

    5 Best Endpoint Detection & Response Solutions for 2025

    As more businesses continue to adopt hybrid work arrangements, it’s becoming increasingly important for company endpoints to be secured and protected against threats and malicious actors. Whether it’s company-issued laptops or the data stored therein, taking a proactive approach to protecting these endpoints helps keep businesses safe from data breaches or costly cyberattacks. Fortunately, various endpoint detection and response solutions…

    Read More »
  • Blog

    Banshee stealer evades detection using Apple XProtect encryption algo

    A new version of the Banshee info-stealing malware for macOS has been evading detection over the past two months by adopting string encryption from Apple’s XProtect. Banshee is an information stealer focused on macOS systems. It emerged in mid-2024 as a stealer-as-a-service available to cybercriminals for $3,000. Its source code was leaked on the XSS forums in November 2024, leading to…

    Read More »
  • Blog

    Bringing Real-Time Phishing Detection to Microsoft Outlook

    Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Advances in generative AI have driven a surge…

    Read More »
  • Blog

    Google Is Working on AI-Powered Scam Detection for Chrome

    Scams are everywhere right now. It’s never been more important to stay vigilant, whether you’re checking your email, browsing the web, or answering a phone call. But it’s not all on you: As it happens, Google might be using artificial intelligence to help prevent you from being a victim of an scam—at least while using Chrome. As spotted by researcher…

    Read More »
  • Blog

    Google Chrome uses AI to analyze pages in new scam detection feature

    Google is using artificial intelligence to power a new Chrome scam protection feature that analyzes brands and the intent of pages as you browse the web. As spotted by Leo on X, a new flag in Chrome Canary enables a feature called “Client Side Detection Brand and Intent for Scam Detection” that uses an LLM, or Large Language Model. to analyze web pages…

    Read More »
  • Blog

    Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation

    Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to understand the current cybersecurity vendor landscape and continually assess the effectiveness of available solutions. Luckily, the 2024 MITRE ATT&CK Evaluation — the most widely trusted…

    Read More »
  • Blog

    How to stop adblock detection – Bypass anti-adblock on websites

    Is your adblocker failing on some websites due to anti-adblock measures? Many websites implement anti-adblock technologies designed to detect ad blockers. These anti-adblock measures force ads to load even when using the best adblockers like AdBlock Plus and uBlock Origin. So, what can you do to stop adblock detection? We understand your pain! Like you, we want a clean, ad-free…

    Read More »
  • Blog

    Phishing emails increasingly use SVG attachments to evade detection

    Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection. Most images on the web are JPG or PNG files, which are made of grids of tiny squares called pixels. Each pixel has a specific color value, and together, these pixels form the entire image. SVG, or Scalable Vector Graphics, displays…

    Read More »
  • Blog

    Hackers now use ZIP file concatenation to evade detection

    Hackers are targeting Windows machines using the ZIP file concatenation technique to deliver malicious payloads in compressed archives without security solutions detecting them. The technique exploits the different methods ZIP parsers and archive managers handle concatenated ZIP files. This new trend was spotted by Perception Point, who discovered a a concatentated ZIP archive hiding a trojan while analyzing a phishing attack…

    Read More »
  • Blog

    Apple Watch Series 10 leak reveals upgraded ECG sensor and new sleep apnea detection feature

    We’re just a few days away from Apple’s big Glowtime event on Monday, and the rumor mill isn’t showing any signs of stopping. While the iPhone 16 line will undoubtedly be the show’s main star, we also expect the Apple Watch Series 10 (or Apple Watch X) to be revealed along with the AirPods 4. Two new leaks claim the next-gen Apple Watch will feature…

    Read More »
Back to top button
close