Why the Weakest Links Matter
December 16 2020The recent FireEye and SolarWinds compromises reinforce the fact that risks should be understood, controls should be in place, and care should be taken at every opportunity.
Read moreThe recent FireEye and SolarWinds compromises reinforce the fact that risks should be understood, controls should be in place, and care should be taken at every opportunity.
Read moreA key malicious domain name used to control potentially thousands of computer systems compromised via the months-long breach at network monitoring software vendor SolarWinds was commandeered by security experts...
Read moreMore than 90% of devices that run the popular VxWorks embedded operating system remain vulnerable to critical flaws disclosed more than a year ago.
Read moreRedirecting a user to a trusted server buys a secure email gateway company some time while it decides whether a URL is malicious -- but there are avoidable drawbacks...
Read moreWe need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.
Read more
The SF Chronicle is reporting (more details here), and the FBI is confirming, that a Melbourne mathematician and team has decrypted the 1969 message sent by the...
Read moreEnterprises running company's Orion network management software should assume compromise and respond accordingly, security experts say.
Read moreThe $547K fine results from an issue Twitter reported in 2019.
Read moreMore than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security firm says.
Read more
This is interesting:
Toward the end of the second incident that Volexity worked involving Dark Halo, the actor was observed accessing the e-mail account of a user via OWA....
Read more
Recent Comments