To keep an organization safe, you must think about the entire IT ecosystem. The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their...
Read moreFBI: Email Account Compromise Losses Reach $12B
July 15 2018There were more than 78K business email account (BEC) and email account compromise (EAC) scam incidents worldwide between October 2013 and May 2018. New FBI data shows that business...
Read moreFBI: Email Account Compromise Losses Reach $12B
July 15 2018There were more than 78K business email account (BEC) and email account compromise (EAC) scam incidents worldwide between October 2013 and May 2018. New FBI data shows that business...
Read moreA new report details issues with 18 states along with suggestions on what can be done. With the cyberattacked 2016 elections as prelude and the 2018 mid-term elections looming,...
Read more8 Big Processor Vulnerabilities in 2018
July 14 2018Security researchers have been working in overdrive examining processors for issues – and they haven’t come up empty-handed. Image Source: Adobe Stock (Shawn) Since the Spectre and Meltdown vulnerabilities...
Read moreRecent fears that this year’s most prolific ransomware threat has acquired new WannaCry-like propagation capabilities appear unfounded at the moment. The authors of GandCrab, a ransomware sample that in...
Read moreGRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation. Twelve Russian military officers have been indicted on hacking charges as part of Special...
Read moreExecutives and front-line SOC teams see human and technology issues in much different ways, according to two new reports. A Security Operations Center is an expensive resource for protecting...
Read moreWhat’s Cooking With Caleb Sima
July 13 2018Security Pro File: Web app security pioneer dishes on his teenage security career, his love of electric scooters, Ace Ventura – and a new baby food business venture with...
Read moreTrust Your Instincts
July 13 2018A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply...
Read more
Recent Comments