Jelle Wieringa analyzes the differences between HDR and security awareness training and how HDR addresses the security layer of human risk management.
Read moreOkta Post-Exploitation Method Exposes User Passwords
March 23 2023Accidentally typing a password in the username field of the platform saves them to audit logs, to which threat actors can gain access and use to compromise enterprise services.
Read moreDMARC blocks spam and phishing emails sent from spoofed domains, and it's vastly underutilized, a new report says.
Read moreDMARC blocks spam and phishing emails sent from spoofed domains, and it's vastly underutilized, a new report says.
Read moreIn the triumvirate of identity types, protecting the identity, privacy, and data of carbon-based forms — humans — is key. Safeguards must be in place as AI becomes more...
Read moreMass Ransomware Attack
March 23 2023A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack:
TechCrunch has learned of dozens of organizations that used the affected GoAnywhere file transfer...
Read more
Op[4]'s firmware security platform detects, prioritizes, and remediates exploitable vulnerabilities Internet of Things and embedded systems.
Read moreAutomated Platform Detects, Prioritizes, Remediates Exploitable Vulnerabilities in Internet of Things and Embedded Systems.
Read moreGoogle says it has suspended the app for the Chinese e-commerce giant Pinduoduo after malware was found in versions of the app. The move comes just weeks after Chinese...
Read more
Recent Comments