Long Story on the Accused CIA Vault 7 Leaker
June 6 2022Long article about Joshua Schulte, the accused leaker of the WikiLeaks Vault 7 and Vault 8 CIA data. Well worth reading.
Read moreLong article about Joshua Schulte, the accused leaker of the WikiLeaks Vault 7 and Vault 8 CIA data. Well worth reading.
Read moreA single compromised Slack account can easily be leveraged to deceive other users and gain additional access to other users and multiple Slack channels.
Read moreCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreNew studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.
Read moreOctopus and squid genes are weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreA critical security bug could lead to remote device control, altered lab results, and more, putting patients in danger, agency warns.
Read moreThe U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute...
Read moreBack in November 2020, in the middle of the COVID-19 pandemic, I gave a virtual talk at the International Symposium on Technology and Society: “The Story of the Internet...
Read moreThe latest iteration of CMD-based ransomware is sophisticated and tricky to detect – and integrates token theft and worming capabilities into its feature set.
Read moreDataLenz delivers real-time, machine learning-based breach detection with user behavior modeling for IBM zSystems.
Read more
Recent Comments