Should Our Security Controls Be More Like North Korea or Norway?
November 11 2021When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
Read moreWhen the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
Read moreArsTechnica’s Sean Gallagher has a two–part article on “securing your digital life.” It’s pretty good.
Read moreThe Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally been added to their projects.
Read moreRussian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.
Read moreWiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.
Read moreMost of us have probably heard the term "smishing" -- which is a portmanteau for traditional phishing scams sent through SMS text messages. Smishing messages usually include a link...
Read moreMost of us have probably heard the term "smishing" -- which is a portmanteau for traditional phishing scams sent through SMS text messages. Smishing messages usually include a link...
Read moreCompanies are relying more heavily on third parties, remote employees, and partners, expanding their attack surface area beyond traditional boundaries.
Read moreThreat is spreading widely via spam campaigns, infecting systems with a new malware loader.
Read moreRussian cybercrime group known as T505 is targeting SolarWinds Server-U systems that haven't been patched for a remote code execution vulnerability fixed this summer.
Read more
Recent Comments