Kim Jong Un's Swiss Army knife APT continues to spread its tendrils around the world, showing it's not intimidated by the researchers closing in.
Read moreEvilExtractor Infostealer Campaign Targeting Windows OS
April 22 2023Uptick in EvilExtractor activity aims to compromise endpoints to steal browser from targets across Europe and the US, researchers say.
Read moreIntel Prioritizes Security in Latest vPro Chips
April 22 2023While Intel is building more hardware protections directly into the chips, enterprises still need a strategy for applying security updates on these components.
Read moreHacking Pickleball
April 22 2023My latest book, A Hacker’s Mind, has a lot of sports stories. Sports are filled with hacks, as players look for every possible advantage that doesn’t explicitly break...
Read moreYou know jolly well/What we're going to say/And that's "Do not delay/Simply do it today."
Read moreShadow IT, SaaS Pose Security Liability for Enterprises
April 22 2023Software written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.
Read moreThis a good example of a security feature that can sometimes harm security:
Apple introduced the optional recovery key in 2020 to protect users from online hackers. Users...
Read more
The Tangled Web of IR Strategies
April 21 2023Attackers have their methods timed to the second, and they know they have to get in, do their damage, and get out quickly. CISOs today must detect and block...
Read more3CX Breach Was a Double Supply Chain Compromise
April 21 2023We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk...
Read more
Recent Comments