The distributed denial-as-a-service websites were behind more than 200K attacks on targets including schools and hospitals.
Read moreRansomware Group Debuts Searchable Victim Data
June 14 2022Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation...
Read moreQuantifying the SaaS Supply Chain and Its Risks
June 14 2022Organizations do not have good visibility into all the software-as-a-service applications that connect to and access data stored in core business.
Read moreMobile apps that rely on facial recognition for identity proofing can now detect fraudulent attempts to fake liveness.
Read moreSBOMs should be connected with vulnerability databases to fulfill their promise of reducing risk, Google security team says.
Read moreChinese Threat Actor Employs Fake Removable Devices as Lures in Cyber-Espionage Campaign
June 14 2022"Aoqin Dragon" has been operating since at least 2013, with targets including government and telecommunications companies in multiple countries.
Read moreUpcoming Speaking Engagements
June 14 2022This is a current list of where and when I am scheduled to speak: I’m speaking at the Dublin Tech Summit in Dublin, Ireland, June 15-16, 2022. The list is maintained...
Read moreMartyn Ryder from Morphean explains why forging trusted partnerships is integral to the future of physical security in a world of networks, systems, and the cloud.
Read moreO! What a tangled web we weave, when first we practise to deceive.
Read moreService ingests AWS, GCP and Microsoft Azure data.
Read more
Recent Comments