This year's theme is "See Yourself in Cyber," and these security folks are using the month to reflect on the personal factor in cybersecurity.
Read moreThis is interesting research:
In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics. Specifically, we apply fluid dynamics...
Read more
Who's affected, what you can do while waiting for Microsoft's patches, and how to plan your threat hunting...
Read moreWorried About the Exchange Zero-Day? Here’s What to Do
September 30 2022While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
Read moreFriday Squid Blogging: Breeding the Oval Squid
September 30 2022Japanese scientists are trying to breed the oval squid in captivity. As usual, you can also use this squid post to talk about the security stories in the news that...
Read moreLA School District Ransomware Attackers Now Threaten to Leak Stolen Data
September 30 2022Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.
Read moreLA School District Ransomware Attackers Now Threaten to Leak Stolen Data
September 30 2022Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.
Read moreThe Top 4 Mistakes in Security Programs to Avoid
September 30 2022Overlooking even just a single security threat can severely erode a company’s community and consumer confidence, tarnish reputation and brand, negatively impact corporate valuations, provide competitors with an advantage,...
Read moreReshaping the Threat Landscape: Deepfake Cyberattacks Are Here
September 30 2022It's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to cybercriminals, even unsophisticated ones.
Read moreReshaping the Threat Landscape: Deepfake Cyberattacks Are Here
September 30 2022It's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to cybercriminals, even unsophisticated ones.
Read more
Recent Comments