ZeroFox’s Matt Price and Mike Price discuss their work researching cybersecurity responses to the rising tide of ‘deepfake’ videos. The tools and techniques to create false videos via AI-driven...
Read moreThe Rise of ‘Purple Teaming’
June 17 2019The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team. In 1992, the film Sneakers introduced the term “Red Team” into...
Read moreThe Rise of ‘Purple Teaming’
June 17 2019The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team. In 1992, the film Sneakers introduced the term “Red Team” into...
Read moreAndroid-based two-factor authentication now works for Google applications on iPad and iPhone. Google now has extended its Android-based two-factor authentication to Google applications on iOS devices like iPads and iPhones....
Read moreAndroid-based two-factor authentication now works for Google applications on iPad and iPhone. Google now has extended its Android-based two-factor authentication to Google applications on iOS devices like iPads and iPhones....
Read more7 Truths About BEC Scams
June 16 2019Business email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories. Last summer, the US...
Read more7 Truths About BEC Scams
June 16 2019Business email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories. Last summer, the US...
Read moreCongress Gives ‘Hack Back’ Legislation Another Try
June 16 2019Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks. “Hacking back,” the largely controversial concept by which organizations can target intruders...
Read moreCongress Gives ‘Hack Back’ Legislation Another Try
June 16 2019Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks. “Hacking back,” the largely controversial concept by which organizations can target intruders...
Read moreThe development follows speculation and concern among security experts that the attack group would expand its scope to the power grid. The attackers behind the epic Triton/Trisis attack that...
Read more
Recent Comments