Mitigating Risks in KYC Processes: Preventing Threats in KYC Documentation
“Follow the money” has long been used as a catchphrase to locate corruption, but it is also the best way to determine where cybercriminals will strike. The latest 2023 Verizon Data Breach ...
2023 Palo Alto Report: Top 3 Cybersecurity Threats to Look Out For
Palo Alto Networks’ Unit 42 Network Threat Trends Research Report has been released! Let’s dive into some key findings and see how Votiro Cloud can address and mitigate some of the highlighted threats ...
Unveiling the Power and Pitfalls of AI in Cybersecurity: A Coffee Talk Series
To take some of the uncertainty out of the topics of artificial intelligence (AI) and the world of cybersecurity, Votiro Founder & CTO Aviv Grafi sits down with VP of Product Eric ...
Takeaways from the 2023 Verizon DBIR: 9 Ways Hackers Can Use Files to Attack Your Organization
The annual Verizon Data Breach Investigations Report (DBIR) is an essential resource used by enterprise security leaders to understand the latest trends in cybersecurity and learn lessons on improving organizational defenses. Let’s ...
Weaponized Phishing Attack via WhatsApp Targets International Hospitality & Tourism Industry
Votiro was made aware of a new phishing attack when a hotel employee received a password-protected zip file from an unknown contact via WhatsApp on her work mobile. This method of attack ...
Mitigating the CVE-2023-21716 Vulnerability: Challenges and Solutions
Hidden threats in files are a constant danger for companies doing business, which has again been highlighted with the announcement by Microsoft of a critical vulnerability. In the announced vulnerability CVE-2023-21716, researchers ...
Gartner Recognizes Content Disarm and Reconstruction (CDR) as a High-Benefit Solution
Keeping organizations safe from cybercriminals is a constant cat-and-mouse game of developing better defenses only to have attackers discover new ways around that defense. This struggle is most apparent in defending against ...
Hidden Threats in Financial Institution Data: The Risk of Malicious Macros and Other Malware
The global financial sector stands as a crucial pillar, driving the world economy, but it increasingly relies on digitization and large-scale data ingestion. The heart of its operations is the ceaseless influx ...
How CDR Reduces Malware Risks for Credit Unions
Credit unions are the quiet, neighborly, small-town of the bustling metropolitan Financial Services world. Whether through earned reputation or genius marketing, when someone says “credit union,” it evokes an image of a ...
Unleashing Innovation: Introducing the New Features of our Votiro SaaS Platform
We are thrilled to announce the release of our latest set of features for Votiro ZT Cloud, designed to enhance our customers’ user experience. From advanced customization options to seamless integrations and ...