Compliance is no longer the primary motivator. AppSec is, Cobalt.io says. In an encouraging sign for application security, enterprise organizations are conducting penetration tests more frequently and more broadly...
Read moreUsing Real-Time Events in Investigations
May 14 2020To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreUsing Real-Time Events in Investigations
May 14 2020To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreUsing Real-Time Events in Investigations
May 14 2020To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreUsing Real-Time Events in Investigations
May 14 2020To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreNew Cyber-Espionage Framework Dubbed Ramsay
May 14 2020The framework is designed to collect and exfiltrate sensitive documents from air-gapped networks. Researchers have found a new cyber-espionage framework developed to collect and exfiltrate sensitive files from air-gapped...
Read moreBiometrics in the Great Beyond
May 14 2020A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee’s death? As Kacey Clark,...
Read moreWhile some users are up to speed with the WFH protocol, it’s worth adding a few more items to your security checklist. There’s good news and bad news as...
Read moreThis marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical. Microsoft today released fixes for 111 vulnerabilities...
Read moreMicrosoft Patch Tuesday, May 2020 Edition
May 13 2020Microsoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed...
Read more
Recent Comments