The freshly minted ransomware gang is customizing leaked Babuk source code to go after cyber targets in the US and South Korea — and it's expanding its operations quickly.
Read moreWith the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
Read moreBreaking the DDoS Attack Loop With Rate Limiting
May 16 2023This Tech Tip demonstrates how security engineers can best use rate limits to mitigate distributed denial-of-service attacks.
Read moreA misconfigured cloud instance exposed vehicle data, but not personally identifiable information, the car maker says.
Read moreWe asked you once, we told you twice, now we're ordering you for the third time...
Read moreA two-bit comedian is using a patched Microsoft vulnerability to attack the hospitality industry, and really laying it on thick along the way.
Read moreMicrosoft Advisories Are Getting Worse
May 15 2023A predictable patch cadence is nice, but the software giant can do more.
Read moreUS Transportation Security Agency (TSA) administrator reflects on how the Colonial Pipeline incident has moved the needle in public-private cooperation.
Read moreMicro-Star International Signing Key Stolen
May 15 2023Micro-Star International—aka MSI—had its UEFI signing key stolen last month.
This raises the possibility that the leaked key could push out updates that would infect a computer’s most nether...
Read more
Upcoming Speaking Engagements
May 15 2023This is a current list of where and when I am scheduled to speak: I’m speaking at IT-S Now 2023 in Vienna, Austria, on June 2, 2023 at 8:30 AM...
Read more
Recent Comments