A recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish...
Read moreJuly's updates contained 100+ patches and security policy notes, leaving vulnerability management teams stressed and scrambling to prioritize. We're here to help find some zen.
Read moreThe TeamTNT threat actor appears to be setting the stage for broader cloud worm attacks, researchers say.
Read moreOnly a quarter of hospitals have implemented the strongest level of DMARC, with a third running any version of the email validation protocol.
Read moreArtificial intelligence can be tricked into making password-based authentication even weaker.
Read moreTracking Down a Suspect through Cell Phone Records
July 17 2023Interesting forensics in connection with a serial killer arrest:
Investigators went through phone records collected from both midtown Manhattan and the Massapequa Park area of Long Island—two areas connected...
Read more
Insider Risk Management Starts With SaaS Security
July 17 2023SaaS security posture management helps mitigate common threats posed by malicious or negligent insiders.
Read moreWhy CFOs & CISOs Must Collaborate to Strengthen and Protect Organizations in a Recession
July 17 2023Cyber threats are intensifying even as budgets are being scrutinized. Now, more than ever, security and finance professionals need to align on cybersecurity strategies.
Read moreFriday Squid Blogging: Balloon Squid
July 15 2023Masayoshi Matsumoto is a “master balloon artist,” and he made a squid (and other animals). As usual, you can also use this squid post to talk about the security stories...
Read moreHow Hackers Can Hijack a Satellite
July 15 2023We rely on them for communications, military activity, and everyday tasks. How long before attackers really start to look up at the stars?
Read more
Recent Comments