By embracing cybersecurity as a critical part of our national security and education strategy, and working together to invest in opportunities for all, we can create a safer, more...
Read moreAPT-Like Phishing Threat Mirrors Landing Pages
July 28 2022By dynamically mirroring an organization’s login page, threat actors are propagating legitimate-looking phishing attacks that encourage victims to offer up access to the corporate crown jewels.
Read moreLatest episode - listen now!
Read moreLatest episode - listen now!
Read moreThree observations about our industry that might help demystify security for women entrants.
Read moreThree observations about our industry that might help demystify security for women entrants.
Read moreThe peer-to-peer network IPFS offers an ingenious base for cyberattacks and is seeing a stratospheric increase in malicious hosting.
Read moreNew UFEI Rootkit
July 28 2022Kaspersky is reporting on a new UFEI rootkit that survives reinstalling the operating system and replacing the hard drive. From an article:
The firmware compromises the UEFI, the...
Read more
With Microsoft disabling Office macros by default, threat actors are increasingly using ISO, RAR, LNK, and similar files to deliver malware because they can get around Windows protections.
Read moreWhen Human Security Meets PerimeterX
July 28 2022Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.
Read more
Recent Comments