Every high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
Read moreWhy Classifying Ransomware as a National Security Threat Matters
December 13 2021Government actions help starve attack groups of the resources - money, ability to recruit, and time.
Read moreHow Do I Find My Servers With the Log4j Vulnerability?
December 13 2021This Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read moreHow Do I Find My Servers With the Log4j Vulnerability?
December 13 2021This Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read moreVolvo Confirms R&D Data Stolen in Breach
December 13 2021The company confirmed last week that one of its file repositories was accessed by a third party.
Read moreCustomers advised to adopt alternative internal processes to support the affected human resources services.
Read moreMore than 60 variants of the original exploit were introduced over the last day alone.
Read moreBug-Bounty Programs Shift Focus to Most Critical Flaws
December 13 2021The number of bug bounty programs jumped by a third, the median payout for a critical vulnerability report rose to $3,000, but rewards for easier-to-find lower-severity flaws stagnated in...
Read moreName That Toon: Modern-Day Frosty
December 13 2021Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments