With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down.
Read moreCISA: Multiple APT Groups Infiltrate Defense Organization
October 5 2022Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year.
Read moreOctober Is Cybersecurity Awareness Month
October 5 2022For the past nineteen years, October has been Cybersecurity Awareness Month here in the US, and that event that has always been part advice and part ridicule. I tend...
Read moreSecure Your Application Layer, Secure Your Business
October 5 2022Users and malicious actors interact with your business through the application layer. Build trust in your software by securing this first line of defense.
Read moreNullMixer Dropper Delivers a Multimalware Code Bomb
October 5 2022In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems.
Read moreAs threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls.
Read moreJudge tells the accused that if he hadn't pleaded guilty, "I would have given you life."
Read moreNetSPI Raises $410 Million in Growth Funding from KKR
October 5 2022New investment to fuel the offensive security leader's record-breaking growth and innovation pipeline.
Read more7 Practical Considerations for Effective Threat Intelligence
October 5 2022If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.
Read moreWhy Don’t CISOs Trust Their Employees?
October 5 2022Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough.
Read more
Recent Comments