Beefing up security requires a combination of forensic efforts and proactive mitigation. IP context aids both.
Read moreName That Edge Toon: In Deep Water
April 5 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreWhat We Can Learn From Lapsus$ Techniques
April 5 2022The group is targeting the biggest weak spot in most security postures: finding anomalous behavior by authorized entities.
Read moreFirefox's four-weekly updates just dropped - here's what you need to know.
Read moreGet the update now... if it's available for your phone. Here's how to check.
Read moreMandiant has now tied the group to at least eight unattributed clusters of activity targeting organizations across various industries and regions.
Read moreRemain calm, maintain control, and triage responses appropriately to ensure that the organization can remain resilient against threats during this crisis and through others to come.
Read moreBrian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data.
Virtually all major technology companies serving large numbers of...
Read more
The newly created bureau will help shape norms of responsible government behavior in cyberspace and help US allies bolster their own cybersecurity programs.
Read moreQualys Delivers Multi-Vector EDR 2.0 with Enhanced Prioritization to Quickly Surface the Most Critical Incidents
April 4 2022EDR solution provides comprehensive threat detection and reduces the risk of compromise with vulnerability management and patching all from a single agent.
Read more
Recent Comments