CTO 2.0: Maiffret Rejoins BeyondTrust
September 21 2021Hacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and how it has shaped his security view.
Read moreHacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and how it has shaped his security view.
Read moreCisco Security examines Cisco Umbrella data for trends in malicious DNS activity during 2020.
Read moreSanctions are a result of Suex's role in facilitating transactions for ransomware attackers., officials say.
Read moreA new survey finds most shoppers will stop a transaction if asked for too much personal information or to complete many security steps.
Read moreTactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.
Read moreAn analyst at the Defence Space Administration, Nigeria, Elizabeth Kolade was named in the list of 'One to watch: Security' for the IFSEC Global Influencers in Security and Fire...
Read moreFake heads! (Cue dystopian scifi music.)
Read moreCrypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles being siphoned off to perpetuate the schemes.
Read moreApparently, a nation-state hacked Alaska’s Department of Health and Social Services. Not sure why Alaska’s Department of Health and Social Services is of any interest to a nation-state, but that’s...
Read moreIt happens all the time: Organizations get hacked because there isn't an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe...
Read more
Recent Comments