Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization’s messages. A well-known Russian nation-state hacking...
Read moreArmed with stolen credentials from another breach or from a misconfigured file, attackers delete developers’ repositories on GitHub, Bitbucket, and GitLab, leaving behind ransom notes. Atlassian’s Bitbucket, GitHub, and...
Read moreArmed with stolen credentials from another breach or from a misconfigured file, attackers delete developers’ repositories on GitHub, Bitbucket, and GitLab, leaving behind ransom notes. Atlassian’s Bitbucket, GitHub, and...
Read moreAttackers Add a New Spin to Old Scams
May 7 2019Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says. Cybercriminals have begun abusing legitimate cloud services in new ways...
Read moreAttackers Add a New Spin to Old Scams
May 7 2019Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says. Cybercriminals have begun abusing legitimate cloud services in new ways...
Read moreThe deployment of 5G networks will bring new use cases and revenue opportunities, mobile providers say, but security will be essential. Mobile service providers think the future of 5G...
Read moreThe deployment of 5G networks will bring new use cases and revenue opportunities, mobile providers say, but security will be essential. Mobile service providers think the future of 5G...
Read moreRecruiting developers and testers from the product group is a great way to build a top-notch application security team. Here’s why. As executive director of SAFECode, theSoftware Assurance Forum...
Read moreRecruiting developers and testers from the product group is a great way to build a top-notch application security team. Here’s why. As executive director of SAFECode, theSoftware Assurance Forum...
Read moreHuge DDoS Attacks Shift Tactics in 2019
May 6 2019Analysis of two high-volume DDoS attacks show they’re becoming more difficult to remediate with changes to port and address strategies. On Jan. 10, a distributed denial-of-service (DDoS) attack peaked...
Read more
Recent Comments