Friday Squid Blogging: Squid-Related Game
July 9 2021It’s called “Squid Fishering.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreIt’s called “Squid Fishering.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreDetermining which malware is most damaging, and worthy of immediate attention, has become difficult in environments filled with alerts and noise.
Read moreLast summer, financial institutions throughout Texas started reporting a sudden increase in attacks involving well-orchestrated teams that would show up at night, use stolen trucks and heavy chains to...
Read moreThe analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.
Read moreAs attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.
Read moreYes, the headline is a rhetorical question. But sometimes we get literal answers, and they're well worth remembering.
Read moreThe ElectroRAT Trojan attacker's success highlights the increasingly sophisticated nature of threats to cryptocurrency exchanges, wallets, brokerages, investing, and other services.
Read moreFive ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.
Read moreAnd the winner of Dark Reading's June contest is ...
Read moreAttackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.
Read more
Recent Comments