Though the mills of the Law grind slowly/Yet they grind exceeding small/Though with patience they stand waiting/With exactness grind they all...
Read moreSurveillance malware targets Libyan government entities, with possible links to a 2019 Egypt attack campaign.
Read moreActive threat hunting is the best protection against supply chain attacks like MOVEit and 3CX, experts say.
Read moreDoing Less With Less: Focusing on Value
June 12 2023Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.
Read moreAI-Generated Steganography
June 12 2023New research suggests that AIs can produce perfectly secure steganographic images:
Abstract: Steganography is the practice of encoding secret information into innocuous content in such a manner that an...
Read more
Passkeys See Fresh Momentum With New Pilot Programs
June 10 2023Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud.
Read moreGood news... more patches, this time available proactively
Read moreFriday Squid Blogging: Light-Emitting Squid
June 10 2023It’s a Taningia danae:
Their arms are lined with two rows of sharp retractable hooks. And, like most deep-sea squid, they are adorned with light organs called photophores. They...
Read more
In the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.
Read moreProgress has issued a second patch for additional SQL flaws that are distinct from the zero-day that Cl0p ransomware gang is exploiting.
Read more
Recent Comments