Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate…
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate…
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft…
The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding…
A 22-year-old man from the United Kingdom arrested this week in Spain is allegedly the ringleader of Scattered Spider, a…
The Scattered Spider gang has started to steal data from software-as-a-service (SaaS) applications and establish persistence through creating new virtual machines.…
Threat actors claim to be selling 3TB of data from Advance Auto Parts, a leading automotive aftermarket parts provider, stolen…
A threat actor claiming recent Santander and Ticketmaster breaches says they stole data after hacking into an employee's account at…
This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries.
Startups at Innovation Sandbox 2024 brought clarity to artificial intelligence, protecting data from AI, and accomplishing novel security solutions with…
Actual legislation is a long shot and a decade away, but policy experts are looking to jump-start the conversation around…