To prevent these attacks, businesses must have complete visibility into, and access and management over, disparate devices.
Read more80% of Legacy MSSP Users Planning MDR Upgrade
June 23 2022False positives and staff shortages are inspiring a massive managed detection and response (MDR) services migration, research finds.
Read moreThe credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.
Read moreThe credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.
Read moreLatest epsiode - listen (or read) now!
Read moreOn the Subversion of NIST by the NSA
June 23 2022Nadiya Kostyuk and Susan Landau wrote an interesting paper: “Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process“:
Abstract: In recent decades, the U.S. National Institute of...
Read more
Organizations may not encounter malware targeting cloud systems or networking equipment frequently, but the array of malware they encounter just occasionally are no less disruptive or damaging. That is...
Read moreA voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
Read moreSynopsys Completes Acquisition of WhiteHat Security
June 22 2022Addition of WhiteHat Security provides Synopsys with SaaS capabilities and dynamic application security testing (DAST) technology.
Read moreAqua Security Collaborates With Center for Internet Security to Create Guide for Software Supply Chain Security
June 22 2022In addition, Aqua Security unveiled a new open source tool, Chain-Bench, for auditing the software supply chain to ensure compliance with the new CIS guidelines.
Read more
Recent Comments