As companies hit the gas to accommodate the rapid shift to work-from-home, security fell behind. Now, it's time to close those gaps.
Read moreDetermining Key Shape from Sound
March 24 2021
It’s not yet very accurate or practical, but under ideal conditions it is possible to figure out the shape of a house key by listening to it being...
Read moreRemember Hafnium? Here's the bad news - it's not over yet! Learn why and what to do...
Read moreMore organizations adopt sender authentication, but strict quarantining or rejection of unauthenticated messages remains uncommon.
Read moreThe history and details of China Chopper - a Web shell commonly seen in the widespread Microsoft Exchange Server attacks.
Read moreFormer contractor deleted 1,200 user accounts in revenge.
Read moreMost enterprise security awareness efforts remain half-hearted, a new SANS survey shows.
Read moreDo Cybercriminals Fear Arrest?
March 23 2021Researchers explore how cybercriminals weigh the possibility of arrest and whether it deters criminal activity.
Read morePhish Leads to Breach at Calif. State Controller
March 23 2021A phishing attack last week gave attackers access to email and files at the California State Controller's Office (SCO), an agency responsible for handling more than $100 billion in...
Read moreDisrupting the Cybercriminal Supply Chain
March 23 2021It is time to turn the tables on cybercriminals and use their own tactics against them.
Read more
Recent Comments