The acquisition will bring ReFirm's firmware analysis capabilities alongside Microsoft's Azure Defender for IoT to boost device security.
Read moreA View from Inside a Deception
June 2 2021Pen-testing today's threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC? ...
Read moreThe plugin under active attack has been installed on more than 17,000 websites, Wordpress reports.
Read moreThe plug-in under active attack has been installed on more than 17,000 websites, say researchers.
Read moreIs Your Adversary James Bond or Mr. Bean?
June 2 2021Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.
Read moreSecurity pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.
Read moreThe DarkSide Ransomware Gang
June 2 2021
The New York Times has a long story on the DarkSide ransomware gang.
A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline attack...
Read more
Many nation-state-backed attacks are intended to destabilize the US government, not steal from it.
Read moreResearchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities.
Read moreIf your password gets stolen as part of a data breach, you'll probably be told. But what if your password gets pwned some other way?
Read more
Recent Comments