Cybercrime group that often uses smishing for initial access bypassed traditional OS targeting and evasion techniques to directly gain access to the cloud.
Read moreSecurity by design can't be just a best practice — it has to become a fundamental part of software development.
Read moreS3 Ep135: Sysadmin by day, extortionist by night
May 19 2023Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)...
Read moreCustomized fix recommendations and cut and paste code fixes dramatically reduce remediation times.
Read moreSatori Augments Its Data Security Platform With Posture Management and Data Store Discovery Capabilities
May 18 2023With the new additions to Satori's Data Security Platform, companies gain unprecedented visibility to answer "Where is all my data?" and "Who has access to it?"
Read moreOnce Again, Malware Discovered Hidden in npm
May 18 2023Turkorat-poisoned packages sat in the npm development library for months, researchers say.
Read moreLexisNexis Risk Solutions Cybercrime Report Reveals 20% Annual Increase in Global Digital Attack Rate
May 18 2023Elevated attack rate expected to remain during 2023 as cybercrime becomes more sophisticated and widespread.
Read moreNew retainer provides expert support starting in the first 72 hours of the incident response process to contain the attack and improve preparedness for the future.
Read moreAs ChatGPT adoption grows, the industry needs to proceed with caution. Here's why.
Read moreAs ChatGPT adoption grows, the industry needs to proceed with caution. Here's why.
Read more
Recent Comments