If you have data you very likely have entity resolution challenges. Entity resolution is the task of figuring out who is who and what is what in your data. It encompasses finding duplicates, correlating, disambiguation and understanding the relationships between people, objects and key metadata. Entity resolution is a key part of many workflows including use cases for … [Read more...] about Senzing: AI powered entity resolution to find who is who and what is what in your data
A sextortion scam that doubles its chances of success by planting ransomware on the computing device of its target victims has emerged, and as is often the case the attackers want to be paid in bitcoin. According to researchers at cybersecurity firm Proofpoint, the sextortion campaign, which is mostly targeting residents of the United States, is including links in the blackmail … [Read more...] about Sextortion Emails Force Payment via GandCrab Ransomware
We have written quite a bit about the Insider Threat and know it is a topic with many views. Here is another: The possibility that a breach or a cyber attack could be down to an employee or former employee is growing all the time. It could be a malicious attack from a disgruntled member of staff who has recently been sacked or who has a grudge against the business, for … [Read more...] about You think your business is primed to deal with any cyber threat – but what if it’s an inside job?
A cyber espionage group is deploying a new type of trojan malware against telecommunications, information technology, and government organisations. Dubbed Seedworm, the group has been operating since at least 2017, and although it predominantly looks to infiltrate organisations in the Middle East, organisations based in Europe and North America have also been targets. The … [Read more...] about IT firms, telcos among dozens hacked in new info-stealing malware attack
Email remains the main communication tool for businesses. If an email account is hacked it can allow the attacker access to the personal, sensitive, or confidential information in the mail storage; as well as allowing them to read new incoming and outgoing email and to send and receive as the legitimate owner. With advances in medicine to advances in space, why can we not … [Read more...] about Why are we still at risk from email hacking?