Cloud Attack Analysis Unearths Lessons for Security Pros
November 11 2021Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
Read moreResearchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
Read moreLatest epsiode - listen now!
Read moreEnterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.
Read moreThe Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.
Read moreWhen the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
Read moreArsTechnica’s Sean Gallagher has a two–part article on “securing your digital life.” It’s pretty good.
Read moreThe Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally been added to their projects.
Read moreRussian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.
Read moreWiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.
Read moreMost of us have probably heard the term "smishing" -- which is a portmanteau for traditional phishing scams sent through SMS text messages. Smishing messages usually include a link...
Read more
Recent Comments