SBOMs should be connected with vulnerability databases to fulfill their promise of reducing risk, Google security team says.
Read moreChinese Threat Actor Employs Fake Removable Devices as Lures in Cyber-Espionage Campaign
June 14 2022"Aoqin Dragon" has been operating since at least 2013, with targets including government and telecommunications companies in multiple countries.
Read moreUpcoming Speaking Engagements
June 14 2022This is a current list of where and when I am scheduled to speak: I’m speaking at the Dublin Tech Summit in Dublin, Ireland, June 15-16, 2022. The list is maintained...
Read moreMartyn Ryder from Morphean explains why forging trusted partnerships is integral to the future of physical security in a world of networks, systems, and the cloud.
Read moreO! What a tangled web we weave, when first we practise to deceive.
Read moreService ingests AWS, GCP and Microsoft Azure data.
Read moreBeware the ‘Secret Agent’ Cloud Middleware
June 14 2022New open source database details the software that cloud service providers typically silently install on enterprises' virtual machines — often unbeknownst to customers.
Read moreUnderstanding and Mitigating Single Sign-on Risk
June 14 2022SSO's one-to-many architecture is both a big advantage and a weakness.
Read moreHacking Tesla’s Remote Key Cards
June 14 2022Interesting vulnerability in Tesla’s NFC key cards:
Martin Herfurt, a security researcher in Austria, quickly noticed something odd about the new feature: Not only did it allow the car...
Read more
“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison
June 14 2022A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service...
Read more
Recent Comments