Remedying the “garbage in, garbage out” problem requires an understanding of what is causing the problem in the first place. When using event logs to monitor for security violations...
Read moreThis is Not Your Father’s Ransomware
April 4 2020Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister....
Read moreThis is Not Your Father’s Ransomware
April 4 2020Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister....
Read more5 Soothing Security Products We Wish Existed
April 4 2020Maybe security alert fatigue wouldn’t be so bad if the alerts themselves delivered less stress and more aromatherapy. These are trying times. Dark Reading recently collected some of the free...
Read more5 Soothing Security Products We Wish Existed
April 4 2020Maybe security alert fatigue wouldn’t be so bad if the alerts themselves delivered less stress and more aromatherapy. These are trying times. Dark Reading recently collected some of the free...
Read moreA security researcher earned $75,000 for finding a whopping seven zero-days in Safari, three of which can be combined to access the camera. Apple has rewarded a security researcher...
Read moreA security researcher earned $75,000 for finding a whopping seven zero-days in Safari, three of which can be combined to access the camera. Apple has rewarded a security researcher...
Read moreThe FBI expects attackers will target virtual environments as more organizations rely on them as a result of the COVID-19 pandemic. The FBI’s Internet Crime Complaint Center (IC3) has...
Read moreThe FBI expects attackers will target virtual environments as more organizations rely on them as a result of the COVID-19 pandemic. The FBI’s Internet Crime Complaint Center (IC3) has...
Read more
Recent Comments