The Emergence of Dynamic Threat HuntingA review of the evolving cyber security industry over 15 years in business By James “Jim” McMurry, CEO […] The post...
Author: admin
Securing Your Organization During Global Turmoil
Securing Your Organization During Global TurmoilRepelling Cyber Criminals Trying to Capitalize on a Crisis By Kevin Orr, President, RSA Federal Current geopolitical crises […] The post...
What is Cyber Threat Hunting? The Ultimate Guide
What is Cyber Threat Hunting? The Ultimate Guide Cyber Threat Hunting is a novel approach to Threat Detection which is aimed at finding cyber threats within...
Remotely Controlling Touchscreens
Remotely Controlling TouchscreensThis is more of a demonstration than a real-world vulnerability, but researchers can use electromagnetic interference to remotely control touchscreens. From a news article:...
Zoom Exploit on MacOS
Zoom Exploit on MacOSThis vulnerability was reported to Zoom last December: The exploit works by targeting the installer for the Zoom application, which needs to run...
When Efforts to Contain a Data Breach Backfire
When Efforts to Contain a Data Breach BackfireEarlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The...
A Parent’s Guide To The Metaverse – Part One
A Parent’s Guide To The Metaverse – Part One We’ve all heard about the Metaverse. And there’s no doubt it has certainly captured the attention of...
Apple security updates fix 2 zero-days used to hack iPhones, Macs
Apple security updates fix 2 zero-days used to hack iPhones, MacsApple has released emergency security updates today to fix two zero-day vulnerabilities previously exploited by attackers...
Africa – the most cyber attacked continent, a 2022 review of trends
Africa – the most cyber attacked continent, a 2022 review of trendsIssam El Haddioui: Head of Security Engineering, EMEA – Africa | Security Evangelist with the...
Kage – Graphical User Interface For Metasploit Meterpreter And Session Handler
Kage – Graphical User Interface For Metasploit Meterpreter And Session HandlerKage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with...
Google Chrome Zero-Day Found Exploited in the Wild
Google Chrome Zero-Day Found Exploited in the WildThe high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.Leer másDark ReadingThe high-severity security vulnerability (CVE-2022-2856) is due...
TechScape: Why can’t crypto exterminate its bugs?
TechScape: Why can’t crypto exterminate its bugs?‘Provenance hashes’ and bug bounties are supposed to protect platforms. Why do so many flaws in crypto and open-source projects...
Google Cloud Adds Curated Detection to Chronicle
Google Cloud Adds Curated Detection to ChronicleThe curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats and Windows-based attacks...
Discover Cloud Smart Networking and Security at VMware Explore 2022
Discover Cloud Smart Networking and Security at VMware Explore 2022The battleground has shifted dramatically. As networks expand and become more complex with the growth of multi-cloud...
VMware’s Karen Worstell Recognized as 2022 ISSA International Distinguished Fellow
VMware’s Karen Worstell Recognized as 2022 ISSA International Distinguished FellowAt Black Hat USA, VMware senior cybersecurity strategist Karen Worstell was recognized as a 2022 ISSA International...
The Complete Networking Professionals’ Guide to VMware Explore
The Complete Networking Professionals’ Guide to VMware ExploreThe rapid shift from on-premises to the cloud is answering as many questions as it is creating. You need...
The Definitive Security Professionals’ Guide to VMware Explore
The Definitive Security Professionals’ Guide to VMware ExploreAs the architectures used by your organization continue to rapidly evolve with the growth of multi-cloud environments, so do...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Patch Madness: Vendor Bug Advisories Are Broken, So Broken
Patch Madness: Vendor Bug Advisories Are Broken, So BrokenDustin Childs and Brian Gorenc of ZDI take the opportunity at Black Hat USA to break down the...
Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass
Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypassSome signed third-party bootloaders for the Unified Extensible Firmware Interface (UEFI) used by Windows could allow attackers to...
Cybercriminals Weaponizing Ransomware Data for BEC Attacks
Cybercriminals Weaponizing Ransomware Data for BEC AttacksAttacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated...
How and Why to Apply OSINT to Protect the Enterprise
How and Why to Apply OSINT to Protect the EnterpriseHere's how to flip the tide and tap open source intelligence to protect your users.Leer másDark ReadingHere's...
Anonymous poop gifting site hacked, customers exposed
Anonymous poop gifting site hacked, customers exposedShitExpress, a web service that lets you send a box of feces along with a personalized message to friends and...
Chinese hackers backdoor chat app with new Linux, macOS malware
Chinese hackers backdoor chat app with new Linux, macOS malwareVersions of a cross-platform instant messenger application focused on the Chinese market known as 'MiMi' have been...
Microsoft is showing ads for Microsoft 365 in Office 2021
Microsoft is showing ads for Microsoft 365 in Office 2021Microsoft is showing ads for Microsoft 365 Family subscriptions to its Office 2021 customers, offering them discounts...
The Week in Ransomware – August 12th 2022 – Attacking the defenders
The Week in Ransomware - August 12th 2022 - Attacking the defendersIt was a very busy week for ransomware news and attacks, especially with the disclosure...
SOVA malware adds ransomware feature to encrypt Android devices
SOVA malware adds ransomware feature to encrypt Android devicesThe SOVA Android banking trojan continues to evolve with new features, code improvements, and the addition of a...
Google fined $60 million over Android location data collection
Google fined $60 million over Android location data collectionThe Australian Competition and Consumer Commission (ACCC) announced that Google was fined $60 million for misleading Australian Android...
Over 9,000 VNC servers exposed online without a password
Over 9,000 VNC servers exposed online without a passwordResearchers have discovered at least 9,000 exposed VNC (virtual network computing) endpoints that can be accessed and used...
Latin America: A region of challenges and opportunities
Latin America: A region of challenges and opportunitiesFrancisco Robayo is a cyber security expert with 15 years of experience in the sector and more than 20...
















