As digital identity verification challenges grow, organizations need to adopt a more advanced and forward-focused approach to preventing hacks.
Read moreNew National Cybersecurity Strategy
March 6 2023Last week, the Biden administration released a new National Cybersecurity Strategy (summary here). There is lots of good commentary out there....
Read moreThe Rapid7 Cyber Threat Intelligence Laboratory at the University of South Florida will provide data on real-world threats for faculty and students to use in their research.
Read moreResearchers are prototyping multi-segment shapeshifter drones, which are “the precursors to flying squid-bots.” As usual, you can also use this squid post to talk about the security stories in the...
Read moreAttackers have already targeted electric vehicle (EV) charging stations, and experts are calling for cybersecurity standards to protect this necessary component of the electrified future.
Read moreIndigo Books Refuses LockBit Ransomware Demand
March 4 2023Canada's largest bookseller rejected the pressure of the ransomware gang's countdown timer, despite data threats.
Read morePolish Politician’s Phone Patrolled by Pegasus
March 4 2023A mayor backing Polish opposition elections in parliament has been targeted by special services with Pegasus spyware.
Read more3 Ways Security Teams Can Use IP Data Context
March 4 2023Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
Read moreWondering which cybercrime tools, techniques and procedures to focus on? How about any and all of them?
Read moreA two-month-long automated credential-stuffing campaign exposed personal information of Chick-fil-A customers, including birthdays, phone numbers, and membership details.
Read more
Recent Comments