Friday Squid Blogging: Squid Fetish
January 7 2023Seems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreSeems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreUsing command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.
Read moreIn what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
Read moreI’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17. EDITED TO ADD: The audiobook of We Have Root...
Read moreThe macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
Read moreThe Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.
Read moreStand down from blue alert, it seems... but why not plan your cryptographic agility anyway?
Read moreThis group has found a ton of remote vulnerabilities in all sorts of automobiles. It’s enough to make you want to buy a car that is not Internet-connected. Unfortunately, that...
Read moreSecurity vulnerabilities plague automakers, and as vehicles become more connected, a more proactive stance on cybersecurity will be required — alongside regulations.
Read moreIt's imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis.
Read more
Recent Comments