What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

New I2PRAT communicates via anonymous peer-to-peer network

Criminals try to cover their tracks as best they can. This also includes hiding any activities that control the machines they have compromised. Using I2P is one way of doing that, but until recently this has rarely been used.

   &#160…

IT Pro Tuesday #332

The post IT Pro Tuesday #332 appeared first on Hornetsecurity – Next-Gen Microsoft 365 Security.

German Authorities Disrupt BADBOX Malware Operation

German law enforcement recently announced it disrupted a sophisticated malware operation, dubbed BADBOX, affecting over 30,000 internet-connected devices nationwide.

The German Federal Office of Information (BSI) said it severed communication between …

How to Spot a Voice Cloning Scam

Voice cloning – an AI application that generates a synthetic copy of a person’s voice – can be a powerful assistant for those who’ve lost their voice due to accident or illness. It facilitates translations, speech therapy, and assistive reading. It hel…

Authorities Uncover Massive Vishing Ring With Over 10,000 Victims

 A joint operation involving Spanish and Peruvian authorities has uncovered and dismantled a sophisticated voice phishing (vishing) ring responsible for defrauding over 10,000 victims.

A well-coordinated takedown of a sophisticated operation

The cri…