‘Operation Tripoli’ is another reminder why users cannot trust every link they see on social media sites. Social media platforms have become major malware distribution centers. Criminals are increasingly...
Read moreThree unsecured Amazon S3 storage buckets compromised more than 1TB of data belonging to Attunity and its high-profile clients. Data management firm Attunity exposed more than 1TB of sensitive...
Read moreThree unsecured Amazon S3 storage buckets compromised more than 1TB of data belonging to Attunity and its high-profile clients. Data management firm Attunity exposed more than 1TB of sensitive...
Read moreRansomware Hits Georgia Court System
July 2 2019The court’s IT department is meeting with external agencies to determine the scope and severity of the cyberattack. News reports have confirmed the Georgia court system has been struck...
Read moreRansomware Hits Georgia Court System
July 2 2019The court’s IT department is meeting with external agencies to determine the scope and severity of the cyberattack. News reports have confirmed the Georgia court system has been struck...
Read moreAttend Black Hat USA this summer and see how researchers are subverting the GDPR’s privacy rules and detecting deep fakes with machine learning. Even the most well-meaning cybersecurity laws...
Read moreAttend Black Hat USA this summer and see how researchers are subverting the GDPR’s privacy rules and detecting deep fakes with machine learning. Even the most well-meaning cybersecurity laws...
Read moreOffice 365 Multifactor Authentication Done Right
July 1 2019Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves. Attacks like password spraying, brute force, and phishing have targeted...
Read moreOffice 365 Multifactor Authentication Done Right
July 1 2019Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves. Attacks like password spraying, brute force, and phishing have targeted...
Read morePolymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here’s why. I first wrote about polymorphic malware four...
Read more
Recent Comments