Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers.
Read moreName That Edge Toon: In Hot Water
March 2 2021Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreThe operators of REvil and Gootkit have begun using a tried and tested technique to distribute additional malware, Sophos says.
Read moreWhen a search result looks too good to be true - it IS too good to be true!
Read moreMysterious Macintosh Malware
March 2 2021
This is weird:
Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So...
Read more
Earnings report points to diversion of care during incident for financial loss.
Read moreNew Jailbreak Tool Works on Most iPhones
March 1 2021The Unc0ver team has released a tool that works on iOS 11 and later, and exploits a vulnerability that was recently under attack.
Read moreIs Your Browser Extension a Botnet Backdoor?
March 1 2021A company that rents out access to more than 10 million Web browsers so that clients can hide their true Internet addresses has built its network by paying browser...
Read moreNinjaRMM, which provides tools for managed service providers, aims to create a red team capability following years of attacks against MSPs.
Read moreThe proper template for a modernized SOC team is one that operates seamlessly across domains with a singular, end-to-end view.
Read more
Recent Comments