Businesses must leverage state and local guidance — along with technology — to maintain secure, compliant infrastructure.
Read moreSwatting as a Service
April 17 2023Motherboard is reporting on AI-generated voices being used for “swatting”:
In fact, Motherboard has found, this synthesized call and another against Hempstead High School were just one small part...
Read more
Friday Squid Blogging: Colossal Squid
April 15 2023Interesting article on the colossal squid, which is larger than the giant squid.
The article answers a vexing question:
So why do we always hear about the giant squid and...
Read more
The threat group behind the SolarWinds supply-chain attacks is back with new tools for spying on officials in NATO countries and Africa.
Read moreWhy is ‘Juice Jacking’ Suddenly Back in the News?
April 15 2023KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about "juice jacking," a...
Read moreUpcoming Speaking Engagements
April 15 2023This is a current list of where and when I am scheduled to speak: I’m speaking on “Cybersecurity Thinking to Reinvent Democracy” at RSA Conference 2023 in San Francisco, California,...
Read moreDetailing how extended IoT (xIoT) devices can be used at scale by attackers to establish persistence across networks and what enterprises should start doing about the risk.
Read moreSoftware-Dependency Data Delivers Security to Developers
April 15 2023Google has opened up its software-dependency database, adding to the security data available to developers and tool makers. Now developers need to use it.
Read moreHacking Suicide
April 15 2023Here’s a religious hack:
You want to commit suicide, but it’s a mortal sin: your soul goes straight to hell, forever. So what you do is murder someone. That...
Read moreSecurity Is a Revenue Booster, Not a Cost Center
April 15 2023Focusing on what customers and partners need from a company can help CISOs show the real financial benefits of improving cybersecurity.
Read more
Recent Comments