Latest episode - listen now (or read if you prefer!)
Read moreHow to Upskill Tech Staff to Meet Cybersecurity Needs
August 18 2022Cybersecurity is the largest current tech skills gap; closing it requires a concerted effort to upskill existing staff.
Read moreOpenSSF Announces 13 New Members Committed to Strengthening the Security of the Open Source Software Supply Chain
August 18 2022Hosts next OpenSSF Day in Dublin.
Read moreUSB “Rubber Ducky” Attack Tool
August 18 2022The USB Rubber Ducky is getting better and better.
Already, previous versions of the Rubber Ducky could carry out attacks like creating a fake Windows pop-up box to...
Read more
Google Cloud Adds Curated Detection to Chronicle
August 18 2022The curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats and Windows-based attacks from Google Cloud Threat Intelligence Team.
Read moreDouble 0-day exploits - one in WebKit (to break in) and the other in the kernel (to take over). Patch now!
Read moreGoogle Chrome Zero-Day Found Exploited in the Wild
August 17 2022The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.
Read moreThe stealthy crypter, active since 2015, has been used to deliver a wide range of information stealers and RATs at a rapid, widespread clip.
Read moreThe increased sophistication of cyberattacks makes them more widely damaging and difficult to prevent.
Read moreA suspected Iranian threat actor known as UNC3890 is gathering intel that could be used for kinetic strikes against global shipping targets.
Read more
Recent Comments