Augmenting SMB Defense Strategies With MITRE ATT&CK: A Primer
February 23 2021Any organization can use MITRE ATT&CK as a force multiplier, but it's especially valuable for small ones.
Read moreAny organization can use MITRE ATT&CK as a force multiplier, but it's especially valuable for small ones.
Read moreIt's a bit like Snapchat all over again - but this bug was quickly fixed.
Read moreEasily the most sophisticated skimming devices made for hacking terminals at retail self-checkout lanes are a new breed of PIN pad overlay combined with a flexible, paper-thin device that...
Read moreWhen siloed functions unite in the face of cyberthreats, organizations can continue, uninterrupted, along their paths to digital transformation.
Read moreThe venerable system has served us well but is now outdated. Not that it's time to throw the system away -- use it as a framework to measure risk...
Read more
Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files. From a...
Read moreAPT31 cloned and reused a Windows-based hacking tool for years before Microsoft patched the vulnerability, researchers report.
Read moreAlmost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast.
Read moreFireEye Mandiant says it discovered data stolen via flaw in Accellion FTA had landed on a Dark Web site associated with a known Russia-based threat group.
Read moreA stored cross-site scripting vulnerability in the iCloud website reportedly earned a security researcher $5,000.
Read more
Recent Comments