Think of a number, any number. Take away 42. Add 42 back in. Then pretend you didn't take away 42. How much is left?
Read moreWhy the C-Suite Doesn’t Need Access to All Corporate Data
December 6 2021If zero trust is to work properly, then it must apply to everyone.
Read moreWho Is the Network Access Broker ‘Babam’?
December 3 2021Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing...
Read moreOne-Third of Black Friday Shoppers Were Bots, Fake Users
December 3 2021Fake traffic observed on Nov. 26 included malicious scrapers, sophisticated botnets, fake accounts, and click farms.
Read moreNSO Group Spyware Used to Breach US State Dept. Phones
December 3 2021At least nine US State Department employee iPhones were targeted with sophisticated spyware developed by the Israeli firm NSO Group.
Read moreIGI Cybersecurity Introduces CISO Team-as-a-Service
December 3 2021Service gives customers access to a CISO-led team of practitioners with a variety of skills and expertise.
Read moreFriday Squid Blogging: Squeeze the Squid
December 3 2021Squeeze the Squid is a band. It just released its second album. As usual, you can also use this squid post to talk about the security stories in the news...
Read moreHow Criminals Are Using Synthetic Identities for Fraud
December 3 2021Organizations must improve their cybersecurity protocols to detect fraudulent identities and make sure they're safeguarding their consumers’ personal information.
Read moreMozilla patches critical “BigSig” cryptographic bug: Here’s how to track it down and fix it
December 3 2021Mozilla's cryptographic code had a critical bug. Problem is that numerous apps are affected and may need patching individually.
Read moreLogiq.ai Tackles Observability Problem With LogFlow
December 3 2021LogFlow addresses data risks associated with machine data pipelines.
Read more
Recent Comments