Investor participation from prior round demonstrates confidence in the company's current and future performance.
Read moreBotnets in the Age of Remote Work
September 6 2022Here are some strategies for protecting the business against botnets poised to take advantage of remote-work vulnerabilities.
Read moreThe phishing-as-a-service offering targets accounts from tech giants, and also has connections to PyPI phishing and the Twilio supply chain attack.
Read moreRansomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to...
Read moreChrome and Edge fix zero-day security hole – update now!
September 5 2022This time, the crooks got there first - only 1 security hole patched, but it's a zero-day.
Read more3 Critical Steps for Reducing Cloud Risk
September 5 2022Having a better understanding of how clouds are built, connected, and managed helps organizations mitigate risks and reduce attack surfaces.
Read moreViolence-as-a-Service: Brickings, Firebombings & Shootings for Hire
September 4 2022A 21-year-old New Jersey man has been arrested and charged with stalking in connection with a federal investigation into groups of cybercriminals who are settling scores by hiring people...
Read morePeter Eckersley, co-creator of Let’s Encrypt, dies at just 43
September 4 2022This site, like millions of others, has a certificate from Let's Encrypt. Farewell, Peter Eckersley, PhD, who helped make it all possible.
Read moreFriday Squid Blogging: Squid Images
September 2 2022iStock has over 13,000 royalty-free images of squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...
Read moreThe US government and the Open Source Security Foundation have released guidance to shore up software supply chain security, and now it's up to developers to act.
Read more
Recent Comments