31 Dec NIS 2 compliance for EU businesses: Meet cybersecurity requirements before the deadline (October 17) Introduction If you work as an essential/ critical entity in Europe, you’re likely familiar with the NIS 2 (Network and Informati...
31 Dec Rethinking investigation: Group-IB’s Graph takes a leap forward Introduction Imagine a cybersecurity analyst forced to work without a proper tool that collects data from scattered sources, anal...
31 Dec Hunting Rituals #4: Threat hunting for execution via Windows Management Instrumentation What’s happening? Given the intricate landscape of cybersecurity, the misuse of Windows Management Instrumentation (WMI) stands o...
31 Dec The Duality of the Pluggable Authentication Module (PAM) Introduction Since its creation, Linux has been an operating system (OS) designed for simplicity, functionality, and flexibility....
31 Dec Deepfake Fraud: How AI is Bypassing Biometric Security in Financial Institutions Introduction In late August 2024, a prominent Indonesian financial institution reported a deepfake fraud incident within its mobi...