Lastest episode - listen now! (Full transcript inside.)
Read moreLastest episode - listen now! (Full transcript inside.)
Read moreWho’s Behind the NetWire Remote Access Trojan?
March 10 2023A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected...
Read moreMore than five out of every 1,000 commits to GitHub included a software secret, half again the rate in 2021, putting applications and businesses at risk.
Read moreHow to Jump-Start Your Cybersecurity Career
March 10 2023With more than 700,000 cybersecurity jobs available, now is a good time to consider a career change.
Read moreA top Iranian, state-sponsored threat is a spear-phishing campaign that uses a fake Twitter persona to target women interested in Iranian political affairs and human rights.
Read moreUsers should patch an unauthenticated remote code execution bug impacting FortiOS and FortiProxy administrative interfaces ASAP, Fortinet says.
Read more5 Critical Components of Effective ICS/OT Security
March 9 2023These agile controls and processes can help critical infrastructure organizations build an ICS security program tailored to their own risk profile.
Read moreIt's getting hard to buy cyber insurance, but not having it is not always an option. Low-coverage plans could bridge the gap.
Read moreConfidential computing will revolutionize cloud security in the decade to come and has become a top C-level priority for industry leaders such as Google, Intel and Microsoft. Edgeless Systems...
Read more
Recent Comments