What threats are you missing?

Are traditional security methods enough?

Stay up to date with the SecureValue Blog

Most Recent Articles

How to Spot a Voice Cloning Scam

Voice cloning – an AI application that generates a synthetic copy of a person’s voice – can be a powerful assistant for those who’ve lost their voice due to accident or illness. It facilitates translations, speech therapy, and assistive reading. It hel…

Authorities Uncover Massive Vishing Ring With Over 10,000 Victims

 A joint operation involving Spanish and Peruvian authorities has uncovered and dismantled a sophisticated voice phishing (vishing) ring responsible for defrauding over 10,000 victims.

A well-coordinated takedown of a sophisticated operation

The cri…

Doughnut orders disrupted! Krispy Kreme suffers hack attack

Krispy Kreme, the dispenser of delectable doughnuts, says that it suffered a cyber attack at the end of last month which saw its IT systems compromised and has disrupted online orders in parts of the United States.

In a mandatory SEC filing, the compa…

Police from 15 Countries Shut Down Major DDoS-for-Hire Platforms

A major joint operation involving law enforcement agencies from 15 countries has dismantled 27 distributed denial-of-service (DDoS) platforms.

The operation, dubbed “Operation PowerOFF,” has also led to the arrest of multiple administrators of such pl…