Short article on the evolution of the vampire squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t...
Read moreIdentity and access management was front and center at AWS re:inforce this week.
Read moreAttackers Have ‘Favorite’ Vulnerabilities to Exploit
July 29 2022While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
Read moreDark Reading's digest of other "don't-miss" stories of the week — including a Microsoft alert connecting disparate cybercrime activity together, and an explosion of Luca Stealer variants after an...
Read more911 Proxy Service Implodes After Disclosing Breach
July 29 2022911[.]re, a proxy service that since 2015 has sold access to hundreds of thousands of Microsoft Windows computers daily, announced this week that it is shutting down in the...
Read moreWhy Bug-Bounty Programs Are Failing Everyone
July 29 2022In a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a...
Read moreThe first half of the year saw more than 11,800 reported security vulnerabilities, but figuring out which ones to patch first remains a thankless job for IT teams.
Read moreThe new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.
Read moreWhy was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?
Read moreHow to celebrate SysAdmin Day!
July 29 2022I've just popped in to wish you all/The best SysAdmin Day!
Read more
Recent Comments