Latest episode - listen now! (Or read if you prefer - full transcript inside.)
Read morePentesting Evolves for the DevSecOps World
September 7 2022Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design.
Read moreHoliday Inn Owner InterContinental Has a Breach Trend
September 7 2022After a high-profile 2017 breach and a Holiday Inn ransomware hit earlier this year, IHG confirms that its booking channels and applications have been disrupted in yet another cyberattack.
Read moreFighting Ransomware Takes an Army: Our Public & Private Sector Soldiers Join Forces
September 7 2022Continued collaboration will help win the fight as cybersecurity remains a national priority. International and public-private cooperation is helping stem the damage from ransomware threats and cyberattacks.
Read moreDEADBOLT ransomware rears its head again, attacks QNAP devices
September 7 2022NAS devices make it easy for anyone to add high-capacity file servers to their network. Guess why cybercrooks love NAS devices too...
Read moreHow Can I Protect My SaaS Apps Amid Employee Turnover?
September 7 2022A SaaS-specific security solution can help security teams make sure apps and usage are both secure, reducing the chances of a breach.
Read moreNext-Gen Linux Malware Takes Over Devices With Unique Toolset
September 7 2022The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cyptominer, and allows full remote control.
Read moreIran-Linked APT Cozies Up to ‘Enemies’ in Trust-Based Spy Game
September 7 2022APT42 is posing as a friend to people considered threats to the government, using a raft of different tools to steal relevant info and perform surveillance.
Read moreThe LockBit Ransomware Gang Is Surprisingly Professional
September 7 2022This article makes LockBit sound like a legitimate organization:
The DDoS attack last weekend that put a temporary stop to leaking Entrust data was seen as an opportunity to...
Read more
Here are a few measures your organization can implement to minimize fraudulent behavior and losses.
Read more
Recent Comments