Who's affected, what you can do while waiting for Microsoft's patches, and how to plan your threat hunting...
Read moreWorried About the Exchange Zero-Day? Here’s What to Do
September 30 2022While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
Read moreFriday Squid Blogging: Breeding the Oval Squid
September 30 2022Japanese scientists are trying to breed the oval squid in captivity. As usual, you can also use this squid post to talk about the security stories in the news that...
Read moreLA School District Ransomware Attackers Now Threaten to Leak Stolen Data
September 30 2022Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.
Read moreLA School District Ransomware Attackers Now Threaten to Leak Stolen Data
September 30 2022Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.
Read moreThe Top 4 Mistakes in Security Programs to Avoid
September 30 2022Overlooking even just a single security threat can severely erode a company’s community and consumer confidence, tarnish reputation and brand, negatively impact corporate valuations, provide competitors with an advantage,...
Read moreReshaping the Threat Landscape: Deepfake Cyberattacks Are Here
September 30 2022It's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to cybercriminals, even unsophisticated ones.
Read moreReshaping the Threat Landscape: Deepfake Cyberattacks Are Here
September 30 2022It's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to cybercriminals, even unsophisticated ones.
Read moreCybercriminals See Allure in BEC Attacks Over Ransomware
September 30 2022While ransomware seems stalled, business email compromise (BEC) attacks continue to make profits from the ProxyShell and Log4j vulnerabilities, nearly doubling in the latest quarter.
Read moreTrojanized, Signed Comm100 Chat Installer Anchors Supply Chain Attack
September 30 2022Malicious Comm100 files have been found scattered throughout North America, and across sectors including tech, healthcare, manufacturing, telecom, insurance, and others.
Read more
Recent Comments