What is the cost of a data breach?The cost of a data breach is not easy to define, but as more organizations fall victim to attacks...
True crime shows might be the biggest educational tool for cybercrime awareness
True crime shows might be the biggest educational tool for cybercrime awarenessA survey of U.S. and UK residents conducted by Censuswide and commissioned by identity verification...
How to Comply With the US Government’s Strict Software Requirements
How to Comply With the US Government’s Strict Software RequirementsWe break down H.R. 7900, a well-intentioned but perhaps unrealistic bill that requires companies working with the...
Why patching quality, vendor info on vulnerabilities are declining
Why patching quality, vendor info on vulnerabilities are decliningThose who apply security patches are finding that it’s becoming harder to time updates and determine the impact...
Why business email compromise still tops ransomware for total losses
Why business email compromise still tops ransomware for total lossesWhile businesses are busy trying to protect themselves against ransomware attacks that spark headlines news, threat actors...
Daniel Stori’s ‘How To Cut Onions Without Tears (Using Oracle)’
Daniel Stori’s ‘How To Cut Onions Without Tears (Using Oracle)’ via the inimitable Daniel Stori, crafting superb comics at turnoff.us! (Reprinted from July 28th, 2019) Permalink...
New ransomware HavanaCrypt poses as Google software update
New ransomware HavanaCrypt poses as Google software updateA new strain of ransomware has been making victims for the past two months, masquerading as a Google software...
What is Big Data Security?
What is Big Data Security? Large organizations and enterprises are embracing big data like never before. In fact, New Vantage Partners revealed in 2019 that around...
Russia-linked cyberattacks on Ukraine: A timeline
Russia-linked cyberattacks on Ukraine: A timelineToday is Ukraine Independence day. It's also the six-month anniversary of the official launch of Russia's invasion into Ukraine, with no...
Is your personal data all over the internet? 7 steps to cleaning up your online presence
Is your personal data all over the internet? 7 steps to cleaning up your online presenceYou may not be able to disappear completely from the internet, but...
Researchers warn of darkverse emerging from the metaverse
Researchers warn of darkverse emerging from the metaverseThe metaverse is seen by many companies as a great business opportunity and for new ways of working. Security provider Trend Micro,...
How 2023 cybersecurity budget allocations are shaping up
How 2023 cybersecurity budget allocations are shaping upCybersecurity spending in the coming year may not be recession-proof, but it's likely to be recession-resistant. Still, pressure remains...
WannaCry explained: A perfect ransomware storm
WannaCry explained: A perfect ransomware stormWhat is WannaCry? WannaCry is a ransomware worm that spread rapidly through across a number of computer networks in May of...
Defending in a hostile environment: Key findings from the BlackHat NOC
Defending in a hostile environment: Key findings from the BlackHat NOC Key points The Black Hat network is more unique and complex than a standard enterprise...
FinOps “Crawl, Walk, Run” Maturity Model Applied to Kubernetes
FinOps “Crawl, Walk, Run” Maturity Model Applied to Kubernetes FinOps has become an increasingly popular goal of many organizations. It helps to unite financial teams and...
2022 Cequence Roadshow — Learn the ABCs of API Protection
2022 Cequence Roadshow — Learn the ABCs of API ProtectionSummer’s almost over, and it’s time to head back to class and brush up on the ABCs...
Case Study: DTEX InTERCEPT Helps Multinational Retailer Gain Visibility into Risk in Retail Stores
Case Study: DTEX InTERCEPT Helps Multinational Retailer Gain Visibility into Risk in Retail StoresAs insider risks and threats become more prevalent with the rise of e-commerce...
BSidesTLV 2022 – Ayelet HaShachar Penrod’s ‘Hack LinkedIn Networking (The People Skill, Not The Tech Skill)’
BSidesTLV 2022 – Ayelet HaShachar Penrod’s ‘Hack LinkedIn Networking (The People Skill, Not The Tech Skill)’Our thanks to BSidesTLV for publishing their outstanding conference videos on...
Elastic Security Advances SOAR Integration
Elastic Security Advances SOAR Integration Elastic Security today updated its security orchestration, automation and response (SOAR) platform to provide integrations with similar platforms as part of...
Security Awareness Games in Slack
Security Awareness Games in SlackUsers love ❤️ learning in Slack. We hear this consistently from our users. The interactions are fast and the content is digestible.Games...
Meet Borat RAT, a New Unique Triple Threat
Meet Borat RAT, a New Unique Triple ThreatAtlanta-based cyber risk intelligence company, Cyble discovered a new Remote Access Trojan (RAT) malware. What makes this particular RAT...
CISA Warns of Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability
CISA Warns of Active Exploitation of Palo Alto Networks' PAN-OS VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting Palo Alto Networks...
Researchers Find Counterfeit Phones with Backdoor to Hack WhatsApp Accounts
Researchers Find Counterfeit Phones with Backdoor to Hack WhatsApp AccountsBudget Android device models that are counterfeit versions associated with popular smartphone brands are harboring multiple trojans...
“As Nasty as Dirty Pipe” — 8 Year Old Linux Kernel Vulnerability Uncovered
"As Nasty as Dirty Pipe" — 8 Year Old Linux Kernel Vulnerability UncoveredDetails of an eight-year-old security vulnerability in the Linux kernel have emerged that the...
The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware
The Rise of Data Exfiltration and Why It Is a Greater Risk Than RansomwareRansomware is the de facto threat organizations have faced over the past few...
Suspected Iranian Hackers Targeted Several Israeli Organizations for Espionage
Suspected Iranian Hackers Targeted Several Israeli Organizations for EspionageA suspected Iranian threat activity cluster has been linked to attacks aimed at Israeli shipping, government, energy, and...
New Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak Data
New Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak DataA novel data exfiltration technique has been found to leverage a covert ultrasonic channel to...
XCSSET Malware Updates with Python 3 to Target macOS Monterey Users
XCSSET Malware Updates with Python 3 to Target macOS Monterey UsersThe operators of the XCSSET macOS malware have upped the stakes by making iterative improvements that...
Researchers Warn of AiTM Attack Targeting Google G-Suite Enterprise Users
Researchers Warn of AiTM Attack Targeting Google G-Suite Enterprise UsersThe threat actors behind a large-scale adversary-in-the-middle (AiTM) phishing campaign targeting enterprise users of Microsoft email services have also...
GitLab Issues Patch for Critical Flaw in its Community and Enterprise Software
GitLab Issues Patch for Critical Flaw in its Community and Enterprise SoftwareDevOps platform GitLab this week issued patches to address a critical security flaw in its...





























