A recent campaign shows that the politically motivated threat actor has more tricks up its sleeve than previously known, targeting a critical exploit and wiping logs to cover their...
Read moreExtradited from Spain, PlugWalkJoe has been sentenced in US court and is now headed to federal prison on a raft of charges related to account hijacking and cyber stalking.
Read moreLaw firms have an ethical responsibility to protect their clients' sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to...
Read moreCl0p in Your Network? Here’s How to Find Out
June 27 2023Companies targeted by hacking groups with Cl0p ransomware typically have several chances to catch the attack prior to the payload being deployed, experts say.
Read moreAI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.
Read moreInfrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
Read moreA legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.
Read moreExcel Data Forensics
June 26 2023In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see...
Read moreNot just that infamous Twitter hack, but SIM-swapping, stalking and swatting too...
Read moreIn this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.
Read more
Recent Comments