Amid Recent Geopolitical Tensions, There Have Been Serious Concerns Regarding the Vulnerability of The United States’ Critical Infrastructure. […] The…
Researchers following the activities of advanced persistent (APT) threat groups originating from China, North Korea, Iran, and Turkey say that journalists…
Welcome To the Datagovops Revolution
By Ani Chaudhuri, CEO, Dasera Sales have SalesOps. Marketing has MarketingOps. Engineering and Security have DevOps, DevSecOps, and […] The…
Threats Against Critical Infrastructure Are Looming, Agencies Must Safely Modernize OT Systems
Amid Recent Geopolitical Tensions, There Have Been Serious Concerns Regarding the Vulnerability of The United States’ Critical Infrastructure. […] The…
CNN Exclusive: FBI investigation determined Chinese-made Huawei equipment could disrupt US nuclear arsenal communications
On paper, it looked like a fantastic deal. In 2017, the Chinese government was offering to spend $100 million to build an…
Popular vehicle GPS tracker gives hackers admin privileges over SMS
Vulnerability researchers have found security issues in a GPS tracker that is advertised as being present in about 1.5 million…
A Deep Dive Into the Residential Proxy Service ‘911’
For the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft…
How to Measure the Success of Your Phishing and Security Awareness Training (PSAT) Program
By Greg Crowley, CISO, eSentire Ransomware and crippling cyberattacks are so pervasive they have permeated our social fabric […] The…
Reporter’s Notebook: January 6 hearings are a summertime TV bonanza — a bit like Iran-Contra in the 1980s
Washington D.C. has a penchant for blockbuster summertime hearings, from Iran-Contra in 1987 to 2022's Jan. 6 commission hearings —…
Hackers pose as journalists to breach news media org’s networks
Researchers following the activities of advanced persistent (APT) threat groups originating from China, North Korea, Iran, and Turkey say that journalists…
Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine
Researchers who helped thwart the Russian nation-state group's recent attack on Ukraine's power supply will disclose at Black Hat USA…
How Hackers Create Fake Personas for Social Engineering
And some ways to up your game for identifying fabricated online profiles of people who don't exist.