Google Releases YARA Rules to Disrupt Cobalt Strike Abuse
November 22 2022The popular pen-testing tool is often cracked and repurposed by threat actors. Google now has a plan to address that.
Read moreThe popular pen-testing tool is often cracked and repurposed by threat actors. Google now has a plan to address that.
Read moreAnalysts see an uptick in token theft from authenticated users, allowing threat actors to bypass MFA protections.
Read moreFollowing the dollars reveals pen-test and intrusion-detection startups are the most attractive to investors right now, collectively getting more than $3 billion in funding.
Read moreFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreHere's what that means about our current state as an industry, and why we should be happy about it.
Read moreCheck out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.
Read moreOrganizations that use the consensus principles can significantly improve their cyber resilience without raising costs, MIT research shows.
Read moreThe warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreThe warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreNew study identifies critical focus areas for portfolio companies to reduce cyber risks and costs associated with breaches.
Read more
Recent Comments