After Colonial Pipeline, Critical Infrastructure Operators Remain Blind to Cyber-Risks
August 11 2022In her keynote address at Black Hat USA 2022, Kim Zetter gives scathing rebuke of Colonial Pipeline attack.
Read moreIn her keynote address at Black Hat USA 2022, Kim Zetter gives scathing rebuke of Colonial Pipeline attack.
Read moreUp-and-coming companies shoot their shot in a new feature introduced at the 25th annual cybersecurity conference.
Read moreA cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on...
Read moreEven among businesses with cyber insurance, they lack coverage for basic costs of many cyberattacks, according to a BlackBerry survey.
Read moreMore than 1 million instances of firewalls running Cisco Adaptive Security Appliance (ASA) software have four vulnerabilities that undermine its security, a researcher finds.
Read more18 companies led by Amazon and Splunk announced the OCSF framework, to provide a standard way for sharing threat detection telemetry among different monitoring tools and applications.
Read moreRansomware gang gained access to the company's VPN in May by convincing an employee to accept a multifactor authentication (MFA) push notification.
Read moreLatest episode - listen now! (Or read the transcript if you prefer.)
Read moreIndustry standards would provide predictable and understandable IoT security frameworks.
Read moreThis is the first—of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities, attackers can access the Starlink system and run custom code on the devices.
Read more
Recent Comments