Microsoft Defender protects Mac and Linux from malicious websitesNow that attackers can phish employees on any device and try to extract credentials, endpoint protection has to...
Day: November 22, 2022
How to minimize security risks: Follow these best practices for success
How to minimize security risks: Follow these best practices for successTo reduce security threats within your organization, you must prioritize security risk management. Here are some...
Two Estonians arrested for running $575M crypto Ponzi scheme
Two Estonians arrested for running $575M crypto Ponzi schemeTwo Estonian nationals were arrested in Tallinn, Estonia, on Sunday after being indicted in the U.S. for running a massive...
Android file manager apps infect thousands with Sharkbot malware
Android file manager apps infect thousands with Sharkbot malwareA new collection of malicious Android apps posing as harmless file managers had infiltrated the official Google Play...
What is purple teaming and why is it useful?
What is purple teaming and why is it useful?EXECUTIVE SUMMARY: Networks are under attack and in recent years, securing IT networks and data has never presented...
Harris Center ISO perspective: Product evaluation, board engagement & career advice
Harris Center ISO perspective: Product evaluation, board engagement & career adviceIn this interview, Wes Farris, Information Security Officer for the Harris Center for Mental Health and...
FIRESIDE CHAT: Anchoring security on granular visibility, proactive management of all endpoints
FIRESIDE CHAT: Anchoring security on granular visibility, proactive management of all endpointsEndpoints are where all are the connectivity action is. Related: Ransomware bombardments And securing endpoints...
Covering Data Breaches in an Ethical Way
Covering Data Breaches in an Ethical WayHow Do We Avoid Data Dump Voyeurism and Victim Shaming?Data breaches are tricky to cover, and we want to report...
Cybersecurity Analysis of the FTX Crypto Heist: Part Two
Cybersecurity Analysis of the FTX Crypto Heist: Part TwoOn the heels of the recent FTX financial meltdown came the theft of millions of dollars that left...
K05403841: BIG-IP and BIG-IQ improvements disclosed by Rapid7
K05403841: BIG-IP and BIG-IQ improvements disclosed by Rapid7BIG-IP and BIG-IQ improvements disclosed by Rapid7 Security Advisory Security Advisory Description BIG-IP and BIG-IQ improvements disclosed by Rapid7...
Digital Army 2030: US Army Modernizes Technology at Scale: Part 1
Digital Army 2030: US Army Modernizes Technology at Scale: Part 1In the first episode of this exclusive two-part series, Dr. Raj Iyer, CIO of the U.S....
Central Depository Attack Delays Trade Settlement in India
Central Depository Attack Delays Trade Settlement in IndiaSystems Are Back Online But Brokers Say Some Systems Are Still AffectedTrade-related services resumed Monday at Central Depository Services...
Chinese APT Using Google Drive, Dropbox to Drop Malware
Chinese APT Using Google Drive, Dropbox to Drop MalwareEvolved Mustang Panda Malware Targets Government, Education, Other Sectors GloballyA large-scale cyberespionage campaign by notorious China-based advanced persistent...
5 Hospital Workers Charged with Selling Patient Information
5 Hospital Workers Charged with Selling Patient InformationData of Patients Hurt in Auto Accidents Allegedly Sold to Chiropractors, AttorneysAuthorities charged six people, including five former Tennessee...
RSA CEO Rohit Ghai on Authenticating Users to Mobile Devices
RSA CEO Rohit Ghai on Authenticating Users to Mobile DevicesHow to Defend BYOD Devices Without Installing Software or Creating FrictionThe divide between mobile app detection and...