Posts

Deepfake and Cyber security

Looking at the news of the current year, I was triggered to know that, as per multiple cyber security reports, 2025 has already seen hundreds of deepfake incidents across the globe , with losses in the hundreds of millions of dollars. Deepfake is projected to grow from 500,000 shared files in 2023 to 8 million by 2025.   DeepStrike . While deepfakes started as entertaining experiments in AI, today they are one of the most disruptive forces in cyber security . Among these incidents, two stand out: The Most Shocking Case: Arup’s $25 Million Scam in Hong Kong In early 2025, an employee at the multinational engineering giant Arup attended what seemed like a routine video call with senior executives, including the CFO. During the call, he was instructed to transfer over US$25.6 million to external accounts. The horrifying twist: every single participant on that call was a deepfake avatar —their faces and voices generated by AI CNN . This case shattered assumptions about digital tru...

AI for Cyber Security vs. AI Security

  I have come across two terms that often sound similar but actually mean very different things: AI for cyber security and AI security . At first, I found them confusing, but after reading resources like Microsoft’s What is AI Security? and KPMG’s insights on AI in Cybersecurity , I’ve started to understand the distinction more clearly. Here’s my explanation. What I Learned About AI Security AI security is basically about protecting the AI systems themselves. Since AI models are trained with huge amounts of data, attackers can try to mess with this process or even use the model against us. For example: Data poisoning : where someone adds bad data to corrupt how the AI learns. Adversarial attacks : where small changes in input data can fool the AI completely. Model inversion : where attackers try to pull sensitive information out of the model. According to Microsoft, the key ideas here are confidentiality, integrity, availability, and accountability....

Choosing the Right SIEM: A Practical Guide for Businesses

Introduction In today’s digital world, security breaches are no longer a question of " if " but " when ". Organizations of all sizes are racing to adopt smarter, more proactive ways to detect, investigate, and respond to cyber threats before it's too late. This is where S ecurity I nformation and E vent M anagement ( SIEM ) tools become indispensable. By integrating log management, advanced analytics, automation, and threat intelligence, SIEM platforms provide security teams with a comprehensive view of their entire environment, enabling faster and more effective threat mitigation. In this blog, we’ll dive into the strengths, pricing models, and adoption trends of some of the leading SIEM tools currently available in the market. Product Key Features Pricing Ideal for Splunk Enterprise Security Large-scale analytics, machine learning (ML), SOAR integration, and flexible search capabilities...

Multi-Factor Authentication (MFA)

In today’s world of cyber threats, the traditional username and password combo is no longer enough. This is where Multi-Factor Authentication (MFA) steps in, it is a security measure that requires more than just a password to verify your identity. 🔍 What is Multi-Factor Authentication? Multi-Factor Authentication (MFA) is a security mechanism that verifies a user’s identity by requiring two or more distinct forms of authentication: Something you know – e.g., a password or PIN Something you have – e.g., a smartphone, hardware token Something you are – e.g., a fingerprint, facial scan By combining these factors, MFA significantly reduces the chances of unauthorized access, even if one factor is compromised. 🕰️ The Rise of MFA: Why Did It Come into Existence? In the early days of the internet, security was simple: a username and a password. But as digital footprints expanded and cyberattacks became more sophisticated , passwords alone proved insuffi...

Your Ultimate Guide to Cybersecurity Tools

Why Cyber Security is Important for Everyone—From Businesses (big or small) to Individuals In today's digital age, cyber security isn't just a buzzword; it's a necessity. You might think cyber security is only a concern for large corporations with sensitive data and million-dollar budgets, but that's not true. In fact, cyber security is critical for everyone , from small businesses to individuals trying to keep their devices safe. In this blog post, we’ll explain why cyber security matters for every single company, big or small, and every single individual. Whether you run a small business, work remotely, or just want to keep your phone secure, the digital world is full of threats, and it’s time to take action. Think you’re Too Small to Be Hacked? Think Again Small businesses are increasingly becoming prime targets for cyber attacks. Many cyber criminals consider small businesses to be "easy targets" because they often lack the resources to imp...