Company joins AWS Partner Network to provide customers with industrial cybersecurity solution to ensure reliable electricity and fuel supplies.
Read moreApple’s Lockdown Mode
July 26 2022I haven’t written about Apple’s Lockdown Mode yet, mostly because I haven’t delved into the details. This is how Apple describes it:
Lockdown Mode offers an extreme, optional level...
Read more
OpenFHE Brings New Encryption Tools to Developers
July 26 2022The open source fully homomorphic encryption library from Duality Technologies is intended to help developers build their own FHE-enabled applications.
Read moreThe firmware threat offers ultimate stealth and persistence — and may be distributed via tainted firmware components in a supply chain play, researchers theorize.
Read moreSeveral threat actors used Amadey Bot previously to steal information and distribute malware such as the GandCrab ransomware and the FlawedAmmy RAT.
Read moreAfter leaking 80 million US customer data records in a cyberattack last summer, T-Mobile offers to settle a wide-ranging class action suit for just $350 million.
Read moreWhy Layer 8 Is Great
July 25 2022To help discern legitimate traffic from fraud, it helps to understand user intent as shown through their behavior.
Read moreWhy Layer 8 Is Great
July 25 2022To help discern legitimate traffic from fraud, it helps to understand user intent as shown through their behavior.
Read moreQakbot Is Back With a New Trick: DLL Sideloading
July 25 2022In the latest iteration, Qakbot operators are using DLL sideloading to deliver malware, a technique that places legitimate and malicious files together in a common directory to avoid detection.
Read moreTechnically, it's not a fine, and the lawyers will get a big chunk of it. But it still adds up to a half-billion-dollar data breach.
Read more
Recent Comments