Microsoft and others are doubling down on incident response, adding services and integrating programs to make security analysts and IR engagements more efficient.
Read moreThe marketplace for malicious Google Play applications and app-takeover tools is thriving, thanks to novel hacking techniques and lax enterprise security.
Read moreThat double-whammy Apple browser-to-kernel spyware bug combo we wrote up last week? Turns out it applies to all supported Macs and iDevices - patch now!
Read moreUnpatched Macs, iPhones, and iPads open to browser takeover and system kernel-level malicious code execution, Apple warns.
Read moreWhen ransomware strikes, how much should you gamble on your resources and opponents' intentions? Here's how to deal yourself a rational, informed way to weigh your options after an...
Read moreA hacktivist group working with Russia claims it breached DELTA, the Ukrainian battlefield management system (BMS).
Read moreHow and Why to Put Multicloud to Work
April 11 2023Complex multicloud environments present organizations with security challenges, but also opportunities for efficiency.
Read moreA CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity.
Read moreLLMs and Phishing
April 10 2023Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading victims to respond or...
Read moreThe security error was in the error handling system that was supposed to catch potential security errors...
Read more
Recent Comments