Cyber Security More Than A “You’ve Been Breached Mentality” – Zero Trust, Quantum Computers, And the Future of Cyber Jun 28, 2022 cyberdefensemagazine.com By Dr. Torsten Saab, Principal Engineering Fellow, Raytheon The 2020 Internet Crime Report includes information from 791,790 complaints […] The…
Technology Microsoft Exchange bug abused to hack building automation systems Jun 27, 2022 bleepingcomputer.com A Chinese-speaking threat actor has hacked into the building automation systems (used to control HVAC, fire, and security functions) of…
Technology Clever phishing method bypasses MFA using Microsoft WebView2 apps Jun 26, 2022 bleepingcomputer.com A clever, new phishing technique uses Microsoft Edge WebView2 applications to steal victim's authentication cookies, allowing threat actors to bypass…
Cyber Security Security For Want of a Nail Jun 25, 2022 cyberdefensemagazine.com Don’t Overlook Lifecycle and Data Management Details By Gregory Hoffer, CEO, Coviant Software Threat actors are a relentless […] The…
Cyber Security Operational Security: How to Get Rid of Digital Footprints On The Internet? Jun 21, 2022 cyberdefensemagazine.com By Viktoria Sokurenko, CMO of Ukrainian start-up X-ray OPSEC (Operational Security) is a term used by US intelligence […] The…
Cyber Security Security Gotcha of Consumer and Industrial IoT Devices Jun 20, 2022 cyberdefensemagazine.com By Smit Kadakia, Chief Data Scientist, Seceon Inc. Internet of Things (IoT) and Industrial IoT (IIoT) are not […] The…
Cyber Security What We Mean When We Talk About Cyber Insurance Jun 16, 2022 darkreading.com Cyber insurance is more than a policy for paying off ransomware gangs. It's designed to be something you transfer risk…
Cyber Security Android Spyware ‘Hermit’ Discovered in Targeted Attacks Jun 16, 2022 darkreading.com The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.
Cyber Security Unlocking the Cybersecurity Benefits of Digital Twins Jun 16, 2022 darkreading.com Security pros can employ the technology to evaluate vulnerabilities and system capabilities, but they need to watch for the potential…
Cyber Security Are You Hiring Enough Entry-Level Security Pros? Jun 16, 2022 darkreading.com New (ISC)² survey shows employment levels for entry-level cyber pros lag behind every other experience level.
More Than A “You’ve Been Breached Mentality” – Zero Trust, Quantum Computers, And the Future of Cyber
By Dr. Torsten Saab, Principal Engineering Fellow, Raytheon The 2020 Internet Crime Report includes information from 791,790 complaints […] The…
Microsoft Exchange bug abused to hack building automation systems
A Chinese-speaking threat actor has hacked into the building automation systems (used to control HVAC, fire, and security functions) of…
Clever phishing method bypasses MFA using Microsoft WebView2 apps
A clever, new phishing technique uses Microsoft Edge WebView2 applications to steal victim's authentication cookies, allowing threat actors to bypass…
Security For Want of a Nail
Don’t Overlook Lifecycle and Data Management Details By Gregory Hoffer, CEO, Coviant Software Threat actors are a relentless […] The…
Operational Security: How to Get Rid of Digital Footprints On The Internet?
By Viktoria Sokurenko, CMO of Ukrainian start-up X-ray OPSEC (Operational Security) is a term used by US intelligence […] The…
Security Gotcha of Consumer and Industrial IoT Devices
By Smit Kadakia, Chief Data Scientist, Seceon Inc. Internet of Things (IoT) and Industrial IoT (IIoT) are not […] The…
What We Mean When We Talk About Cyber Insurance
Cyber insurance is more than a policy for paying off ransomware gangs. It's designed to be something you transfer risk…
Android Spyware ‘Hermit’ Discovered in Targeted Attacks
The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.
Unlocking the Cybersecurity Benefits of Digital Twins
Security pros can employ the technology to evaluate vulnerabilities and system capabilities, but they need to watch for the potential…
Are You Hiring Enough Entry-Level Security Pros?
New (ISC)² survey shows employment levels for entry-level cyber pros lag behind every other experience level.