Tesla and Twitter Should be Banned as Threats to Global SecurityTesla and Twitter Should be Banned as Threats to Global Security As you may remember, I’ve...
Year: 2022
Forrester Wave: Security Awareness & Training Solutions (SA&T)
Forrester Wave: Security Awareness & Training Solutions (SA&T)Forrester Wave: Security Awareness & Training Solutions (SA&T) The most recent Forrester Wave: Security Awareness & Training (SA&T) report...
Geopolitics plays major role in cyberattacks, says EU cybersecurity agency
Geopolitics plays major role in cyberattacks, says EU cybersecurity agencyThe ongoing Russia-Ukraine conflict has resulted in an increase in hacktivist activity in the past year, with...
Cybersecurity’s Role in Combating Midterm Election Disinformation
Cybersecurity’s Role in Combating Midterm Election DisinformationKatie Teitler, Senior Cybersecurity Strategist at Axonius and co-host on the popular Enterprise Security Weekly podcast, joins us to discuss...
Japan Joins Key NATO Cyber Agency
Japan Joins Key NATO Cyber AgencyAnother show of strength for the Cooperative Cyber Defence Centre of ExcellenceLeer másAnother show of strength for the Cooperative Cyber Defence...
Qualys previews TotalCloud FlexScan for multicloud security management
Qualys previews TotalCloud FlexScan for multicloud security managementVulnerability management vendor Qualys this week announced the trial availability of its TotalCloud with FlexScan offering, an agentless, cloud-native...
Free Trial for Code Signing Certificate: Myth or Fact?
Free Trial for Code Signing Certificate: Myth or Fact?If you are a code publisher or software developer, your end-users need to trust your software that they...
Robin Banks Phishing Service for Cybercriminals Returns with Russian Server
Robin Banks Phishing Service for Cybercriminals Returns with Russian ServerA phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian provider of...
How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready
How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get readyOrganizations that want to prove to others – and...
What Businesses Need to Know About Ransomware Removal and Recovery
What Businesses Need to Know About Ransomware Removal and RecoveryWhat are the key things businesses need to know about ransomware removal and recovery? The post What...
What are message queues? | Importance, use cases and vulnerabilities | Contrast Security
What are message queues? | Importance, use cases and vulnerabilities | Contrast Security Many significant concerns arise while developing modern-day applications in the cloud, including uptime,...
Twitter Blue Badge email scams – Don’t fall for them!
Twitter Blue Badge email scams – Don’t fall for them!That was the week that was...Leer másNaked SecurityThat was the week that was...
Forrester Wave: Security Awareness & Training Solutions (SA&T)
Forrester Wave: Security Awareness & Training Solutions (SA&T)The most recent Forrester Wave: Security Awareness & Training (SA&T) report was released a few months ago. The report...
BSidesPDX 2022 – Nate Norton’s ‘Live, Laugh, Lyrical Injection: Hacking Karaoke For Fun And Profit’
BSidesPDX 2022 – Nate Norton’s ‘Live, Laugh, Lyrical Injection: Hacking Karaoke For Fun And Profit’Our sincere thanks to BSidesPDX 2022 for publishing their outstanding conference videos...
Identity Threat Response with Brian Desmond
Identity Threat Response with Brian DesmondIdentity threat response—the initial aspect of ITDR—is gaining importance as cyberattackers continue to find new ways into victims’ environments. I recently...
Top 10 Ways to Protect EKS Workloads from Ransomware
Top 10 Ways to Protect EKS Workloads from Ransomware2021 will always be remembered as the year that world took Ransomware seriously. This is because reported ransomware...
LinkedIn Adds Verified Emails, Profile Creation Dates
LinkedIn Adds Verified Emails, Profile Creation DatesFor whatever reason, the majority of the phony LinkedIn profiles reviewed by this author have involved young women with profile...
Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 11/4
Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 11/4 Insight #1 " The game has changed, today's cybercrime cartels want to hijack your...
Tesla and Twitter Should be Banned as Threats to Global Security
Tesla and Twitter Should be Banned as Threats to Global SecurityAs you may remember, I’ve explained before why and how Elon Musk constantly stands accused of...
OPERA1ER Gang Stole $11M from African Banks and Telecom Companies
OPERA1ER Gang Stole $11M from African Banks and Telecom CompaniesA new technical report published by Group-IB reveals that OPERA1ER, a French-speaking hacking group has stolen at...
ICO Slashes Government Data Breach Fine
ICO Slashes Government Data Breach FineUK regulator reduces penalty by 90%Leer másUK regulator reduces penalty by 90%
New RomCom RAT Campaign Abusing Well-Known Software Brands
New RomCom RAT Campaign Abusing Well-Known Software BrandsThe RomCom RAT (remote access trojan) threat actor has launched a new campaign impersonating the official websites of well-known...
“Disturbing” Rise in Nation State Activity, Microsoft Reports
“Disturbing” Rise in Nation State Activity, Microsoft ReportsThe proportion of cyber-attacks perpetrated by nation states targeting critical infrastructure jumped from 20% to 40%Leer másThe proportion of...
All You Need to Know About Secure Shell Protocol
All You Need to Know About Secure Shell ProtocolAn Ultimate Guide on Secure Shell, What is it, How it Functions, and What is it Used for...
Researchers Detail New Malware Campaign Targeting Indian Government Employees
Researchers Detail New Malware Campaign Targeting Indian Government EmployeesThe Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with...
Your OT Is No Longer Isolated: Act Fast to Protect It
Your OT Is No Longer Isolated: Act Fast to Protect ItNot too long ago, there was a clear separation between the operational technology (OT) that drives...
Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer
Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP StealerCybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository...
BSidesPDX 2022 – Pim Trouerbach’s ‘Smokeloader: The Pandora’s Box Of Tricks, Payloads And Anti-Analysis’
BSidesPDX 2022 – Pim Trouerbach’s ‘Smokeloader: The Pandora’s Box Of Tricks, Payloads And Anti-Analysis’Our sincere thanks to BSidesPDX 2022 for publishing their outstanding conference videos on...
Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities
Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day VulnerabilitiesMicrosoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for...
BEC Group Crimson Kingsnake Linked to 92 Malicious Domains
BEC Group Crimson Kingsnake Linked to 92 Malicious DomainsThe group impersonated 19 law firms and debt collection agencies in the US, UK and AustraliaLeer másThe group...





























