Oftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report. Businesses are embracing the cloud at a rate that outpaces their ability to...
Read moreOftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report. Businesses are embracing the cloud at a rate that outpaces their ability to...
Read moreDow Jones Leak Exposes Watchlist Database
March 1 2019The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone. A data leak at Dow Jones...
Read moreDow Jones Leak Exposes Watchlist Database
March 1 2019The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone. A data leak at Dow Jones...
Read moreIn some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says. A group of Turkish-speaking hackers is hijacking popular Instagram profiles,...
Read moreIn some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says. A group of Turkish-speaking hackers is hijacking popular Instagram profiles,...
Read moreBooter Boss Interviewed in 2014 Pleads Guilty
March 1 2019A 20-year-old Illinois man has pleaded guilty to running multiple DDoS-for-hire services that launched millions of attacks over several years. The plea deal comes almost exactly five years after...
Read moreBooter Boss Interviewed in 2014 Pleads Guilty
March 1 2019A 20-year-old Illinois man has pleaded guilty to running multiple DDoS-for-hire services that launched millions of attacks over several years. The plea deal comes almost exactly five years after...
Read moreSolving Security: Repetition or Redundancy?
March 1 2019To effectively defend against today’s risks and threats, organizations must examine their failings as well as their successes. In life in general — and, of course, in security specifically...
Read moreFind your New Favorite Security Tool in the Black Hat Asia Arsenal
February 28 2019From data exfiltration over FM radio to open-source cybersecurity training suites, Black Hat Asia’s Arsenal offers live demos of the latest security tools. Looking for some new cybersecurity tools?...
Read more
Recent Comments