Actions to Take to Defeat Initial Access Brokers
November 18 2023Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.
Read moreInitial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.
Read moreA ransomware gang, annoyed at not being paid, filed an SEC complaint against its victim for not disclosing its security breach within the required four days.
This is over...
Read moreSecurity budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.
Read moreBuilding a resilient incident response team requires more than a simple combination of tools and on-call rotations.
Read moreOrganizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.
Read moreThere's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.
Read moreAcademics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.
Read moreThe Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.”
Read moreVehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.
Read moreThe security holes can allow server takeover, information theft, model poisoning, and more.
Read more
Recent Comments