US Official Reproaches Industry for Bad CybersecurityCISA Director Says Programming Language Swap Will End Memory Safety VulnerabilitiesA top U.S. government official urged industry to become more...
Day: February 28, 2023
Online Shopping Cart Software Vulnerable: German BSI Report
Online Shopping Cart Software Vulnerable: German BSI ReportBSI Study Finds Outdated Software, Vulnerable JavaScript LibrariesAn assessment of online shopping cart software used by e-commerce sites performed...
Australia Centralizes Government Cybersecurity Response
Australia Centralizes Government Cybersecurity ResponseHome Affairs Minister Clare O'Neil Dings Cybersecurity Law as 'Bloody Useless'The Australian government says it will centralize its approach to securing federal...
Fortinet soluciona 40 fallas, 2 críticas con PoC CVE-2022-39952 (PARCHA YA!)
Fortinet soluciona 40 fallas, 2 críticas con PoC CVE-2022-39952 (PARCHA YA!)Fortinet ha publicado actualizaciones de seguridad para abordar 40 vulnerabilidades en su línea de software, incluidos...
Guía de NSA para proteger redes domésticas
Guía de NSA para proteger redes domésticasLa Agencia de Seguridad Nacional de Estados Unidos (NSA) ha publicado una guía para proteger redes domésticas. La guía «Best...
Zero to SIEM in Seconds Part 1: Operationalize in Seconds
Zero to SIEM in Seconds Part 1: Operationalize in SecondsOperationalize in Seconds is the first in a series of blog posts focused on what... The post...
Why Natural Language Processing Is Crucial for Open-Source Intelligence Analysts
Why Natural Language Processing Is Crucial for Open-Source Intelligence AnalystsAs the volume of data continues to grow, it's important to have tools that can help derive...
Addressing Common Executive Compliance Requests
Addressing Common Executive Compliance RequestsThe relationship between executive teams and compliance is a close one, as executives are responsible for ensuring that their organizations adhere to...
Introducing the Inaugural Hacker’s Yearbook
Introducing the Inaugural Hacker’s YearbookGet an overview of the most impactful security trends and cyberattacks of 2022, with key insights to help you prepare for the...
Addressing Common HR Compliance Requests
Addressing Common HR Compliance RequestsPeople & HR departments and organizations must address various compliance requirements to ensure the fair and legal treatment of employees. See some...
USENIX Security ’22 – Alejandro Cabrera Aldaya, Billy Bob Brumley – ‘HyperDegrade: From GHz To MHz Effective CPU Frequencies’
USENIX Security ’22 – Alejandro Cabrera Aldaya, Billy Bob Brumley – ‘HyperDegrade: From GHz To MHz Effective CPU Frequencies’Our thanks to USENIX for publishing their Presenter’s...
The Inaugural Hacker’s Yearbook
The Inaugural Hacker’s YearbookGain a better understanding of the key security trends, cyber breaches, and cyberattacks of 2022 to better prepare for the new challenges of...
“Bizarre” DNS Hacks For Fun And, Um…, Fun
“Bizarre” DNS Hacks For Fun And, Um…, FunI’ve been (slowly) making my way through FOSDEM `23 presentations and caught up to Peter Lowe‘s “Bizarre and Unusual...
Apple fixes zero-day spyware implant bug – patch now!
Apple fixes zero-day spyware implant bug – patch now!Everyone update now! Except for those who don't need to! Or who need to but will only get...
New Sensor Dashboard and Rack PDU Outlet Control
New Sensor Dashboard and Rack PDU Outlet ControlProduct Update: Version 3.11 Our latest product update is a big one! we've introduced a new add-on feature called...
Making the Right Investments to Combat the Cybersecurity Labor Shortage
Making the Right Investments to Combat the Cybersecurity Labor ShortageModernizing PKI can provide the transformative element teams need to stay vigilant and effective throughout the cybersecurity...