
David Balaban
Cybersecurity Expert, Journalist, Editor at Freelance
David Balaban is a computer security researcher with over 17 years of experience in malware analysis and antivirus software evaluation.
Articles
-
1 week ago |
secureworld.io | David Balaban
How Security Teams Collect the Data They Need for Threat Intelligence6:38 The evolution of cybercrime is shifting into hyperdrive. Malicious actors are file-tuning their tactics, techniques, and procedures (TTP) non-stop, leveraging AI to make attacks more sophisticated, and automation to overwhelm the target's defenses.
-
2 weeks ago |
cloudsecurityalliance.org | David Balaban
Written by David Balaban. Staff records often contain sensitive content like personal identifiers and company-related communications. If this data is not properly cleared, it can result in compliance issues and unauthorized access. A systematic method guarantees that all digital and physical details are either erased, archived, or transferred in accordance with industry regulations. Furthermore, taking the route of automation throughout this process minimizes the risk of human error and misuse.
-
3 weeks ago |
unite.ai | David Balaban
The introduction and evolution of generative AI have been so sudden and intense that it’s actually quite difficult to fully appreciate just how much this technology has changed our lives. Zoom out to just three years ago. Yes, AI was becoming more pervasive, at least in theory. More people knew some of the things it could do, although even with that there were massive misunderstandings about the capabilities of AI.
-
1 month ago |
unite.ai | David Balaban
The privacy risks posed by generative AI are very real. From increased surveillance and exposure to more effective phishing and vishing campaigns than ever, generative AI erodes privacy en masse, indiscriminately, while providing bad actors, whether criminal, state-sponsored or government, with the tools they need to target individuals and groups.
-
2 months ago |
secureworld.io | David Balaban
4 Most Common Network Attacks and How to Thwart Them8:42 Thinking of connectivity as the gravity center of every modern organization's digital ecosystem isn't a far-fetched perspective. It's deeply ingrained into the very fabric of collaboration, cloud computing, data sharing, remote work, and customer engagement. All these crucial areas take a major hit when a network attack happens. And, the unfortunate reality is that no network is immune.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 11
- Tweets
- 44
- DMs Open
- No

Ways to Pinpoint Exploitable IoT Devices https://t.co/Vdc5Qj2SZH

How Good Are In-Browser Password Managers? https://t.co/Om4W0eMHdG

Ransomware evolution chronicles https://t.co/6YGfbaBMO9