detection
-
Blog
Machine Learning in NGFW Threat Detection
Next-Generation Firewalls (NGFWs) have become a cornerstone of modern cybersecurity infrastructure. Traditional firewalls filter traffic based on static rules, but NGFWs offer more advanced features. These include intrusion prevention, application awareness, and deep packet inspection. Cyber threats are becoming more complex and difficult to combat, so NGFW producers have turned to Machine Learning (ML) to enhance detection methods. Machine Learning,…
Read More » -
Blog
300 days under the radar: How Volt Typhoon eluded detection in the US electric grid for nearly a year
New research shows the notorious Volt Typhoon threat group was able to remain undetected in the US electric grid for nearly a year, and experts have told ITPro the incident highlights rampant OT security failures. Operational technology (OT) security specialist Dragos published a report covering a specific intrusion that affected a local public utility in Massachusetts, the Littleton Electric Light…
Read More » -
Blog
Machine Learning for Threat Detection Guide
Cyber threats are becoming increasingly sophisticated and diverse. Traditional security tools and manual threat detection methods fall short in identifying novel or previously unseen attacks, especially with the volume and complexity of data involved. This is where machine learning (ML) comes into play, revolutionizing threat detection by enabling systems to identify anomalies in network traffic that might indicate malicious behavior.…
Read More » -
Blog
Pixel Phones Are Getting a New Scam Detection Tool
Pixel users will soon get an extra layer of protection against malicious calls and texts, as Google’s AI-powered, real-time scam detection is rolling out widely next month. The Gemini Nano feature, which is coming to both Google Messages and Phone by Google, runs in the background and will alert you mid-call if it identifies “conversation patterns commonly associated with scammers.”…
Read More » -
Blog
5 Best BGP Monitoring & Anomaly Detection Tools for 2025
Border Gateway Protocol (BGP) is the only routing methodology that operates on the Internet. It is central to the routing decision-making implemented by routers. Thus, it enables data to traverse networks across different Autonomous Systems (ASes). Given its foundational importance to internet traffic flow, BGP has unfortunately become a prime target for malicious actors. The nature of BGP’s design, which…
Read More » -
Blog
How to set up crash detection on your Android phone
Your phone comes with a number of useful features that we hope you’ll never have to use — and crash detection falls into that category. Movement sensors detect when you’re driving — and when you come to a sudden and abrupt stop. Your phone or watch can then alert emergency services, along with family and friends, even if you’re incapacitated.…
Read More » -
Blog
Managed Detection and Response – How are you monitoring?
Security Information and Event Management (SIEM) systems are now a critical component of enterprise security operations, helping organizations detect, respond to, and manage threats in an increasingly complex cyber threat landscape. At Smarttech247 we are seeing firsthand how SIEM platforms can struggle to keep up with modern demands. In MDR (Managed Detection and Response) we need to be very particular…
Read More » -
Blog
5 Best Endpoint Detection & Response Solutions for 2025
As more businesses continue to adopt hybrid work arrangements, it’s becoming increasingly important for company endpoints to be secured and protected against threats and malicious actors. Whether it’s company-issued laptops or the data stored therein, taking a proactive approach to protecting these endpoints helps keep businesses safe from data breaches or costly cyberattacks. Fortunately, various endpoint detection and response solutions…
Read More » -
Blog
Banshee stealer evades detection using Apple XProtect encryption algo
A new version of the Banshee info-stealing malware for macOS has been evading detection over the past two months by adopting string encryption from Apple’s XProtect. Banshee is an information stealer focused on macOS systems. It emerged in mid-2024 as a stealer-as-a-service available to cybercriminals for $3,000. Its source code was leaked on the XSS forums in November 2024, leading to…
Read More » -
Blog
Bringing Real-Time Phishing Detection to Microsoft Outlook
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Advances in generative AI have driven a surge…
Read More »