Syndicated Blog

Votiro
Votiro Cloud
Mitigating Risks in KYC Processes: Preventing Threats in KYC Documentation

Mitigating Risks in KYC Processes: Preventing Threats in KYC Documentation

| | Blog
“Follow the money” has long been used as a catchphrase to locate corruption, but it is also the best way to determine where cybercriminals will strike. The latest 2023 Verizon Data Breach ...
2023 Palo Alto Report: Top 3 Cybersecurity Threats to Look Out For

2023 Palo Alto Report: Top 3 Cybersecurity Threats to Look Out For

Palo Alto Networks’ Unit 42 Network Threat Trends Research Report has been released! Let’s dive into some key findings and see how Votiro Cloud can address and mitigate some of the highlighted threats ...
Generative AI & Cybersecurity - Votiro Coffee Talk Series

Unveiling the Power and Pitfalls of AI in Cybersecurity: A Coffee Talk Series

| | Blog
To take some of the uncertainty out of the topics of artificial intelligence (AI) and the world of cybersecurity, Votiro Founder & CTO Aviv Grafi sits down with VP of Product Eric ...
Log4j CVE-2021-44228 Exploits Using PDF as a Delivery Channel

Takeaways from the 2023 Verizon DBIR: 9 Ways Hackers Can Use Files to Attack Your Organization

| | 2023, Blog, dbir, Insights, Report, Takeaways, verizon
The annual Verizon Data Breach Investigations Report (DBIR) is an essential resource used by enterprise security leaders to understand the latest trends in cybersecurity and learn lessons on improving organizational defenses. Let’s ...
🙋‍♀️

Weaponized Phishing Attack via WhatsApp Targets International Hospitality & Tourism Industry

| | Blog
Votiro was made aware of a new phishing attack when a hotel employee received a password-protected zip file from an unknown contact via WhatsApp on her work mobile. This method of attack ...

Mitigating the CVE-2023-21716 Vulnerability: Challenges and Solutions

| | Blog
Hidden threats in files are a constant danger for companies doing business, which has again been highlighted with the announcement by Microsoft of a critical vulnerability. In the announced vulnerability CVE-2023-21716, researchers ...
Gartner Recognizes Content Disarm and Reconstruction (CDR) as a High-Benefit Solution

Gartner Recognizes Content Disarm and Reconstruction (CDR) as a High-Benefit Solution

| | Blog
Keeping organizations safe from cybercriminals is a constant cat-and-mouse game of developing better defenses only to have attackers discover new ways around that defense. This struggle is most apparent in defending against ...

Hidden Threats in Financial Institution Data: The Risk of Malicious Macros and Other Malware 

| | Blog
The global financial sector stands as a crucial pillar, driving the world economy, but it increasingly relies on digitization and large-scale data ingestion. The heart of its operations is the ceaseless influx ...
How CDR Reduces Malware Risks for Credit Unions

How CDR Reduces Malware Risks for Credit Unions

| | Blog
Credit unions are the quiet, neighborly, small-town of the bustling metropolitan Financial Services world. Whether through earned reputation or genius marketing, when someone says “credit union,” it evokes an image of a ...
Unleashing Innovation: Introducing the New Features of our Votiro SaaS Platform

Unleashing Innovation: Introducing the New Features of our Votiro SaaS Platform

| | Blog
We are thrilled to announce the release of our latest set of features for Votiro ZT Cloud, designed to enhance our customers’ user experience. From advanced customization options to seamless integrations and ...