Learn how the trick works so that you can avoid it in case someone thinks it's a joke to catch you out.
Read moreAnalysis of the FBI’s Anom Phone
July 12 2021Motherboard got its hands on one of those Anom phones that were really FBI honeypots. The details are interesting.
Read moreEstimates indicate the number of affected companies could grow, while Kaseya faces renewed scrutiny as former employees reportedly criticize its lack of focus on security.
Read moreAI and Cybersecurity: Making Sense of the Confusion
July 12 2021Artificial intelligence is a maturing area in cybersecurity, but there are different concerns depending on whether you're a defender or an attacker.
Read moreMicrosoft Active Directory, ubiquitous across enterprises, has long been a primary target for attackers seeking network access and sensitive data.
Read moreFriday Squid Blogging: Squid-Related Game
July 9 2021It’s called “Squid Fishering.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreDetermining which malware is most damaging, and worthy of immediate attention, has become difficult in environments filled with alerts and noise.
Read moreLast summer, financial institutions throughout Texas started reporting a sudden increase in attacks involving well-orchestrated teams that would show up at night, use stolen trucks and heavy chains to...
Read moreThe analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.
Read moreAs attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.
Read more
Recent Comments