Top 10 Malware May 2022
The MS-ISAC shares that its top 10 malware lineup for May 2022 remained consistent with the exception of Jupyter's return. Read More
Identifying XML External Entity: How Tenable.io Web Application Scanning Can Help
XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths...
How to get Fortune 500 cybersecurity without the hefty price tag
Graham Cluley Security News is sponsored this week by the folks at SolCyber. Thanks to the great team there for their support! If the bad...
Governance Gap Raises AI Security Concerns
Cyber now seen as most important component for adoption Read More
Hartzbleed: A New Side-Channel Attack
Hartzbleed is a new side-channel attack that works against a variety of microprocressors. Deducing cryptographic keys by analyzing power consumption has long been an attack,...
QNAP Customers Hit by Double Ransomware Blitz
Taiwanese manufacturer braced for twin threat Read More
Investigators Disrupt Giant RSocks Botnet
Russian cyber-criminals rented it out to other groups Read More
API attack types and mitigations
This blog was written by an independent guest blogger. Stop, look, listen; lock, stock, and barrel; "Friends, Romans, Countrymen..." The 3 Little Pigs; Art has...
Cryptojacking explained: How to prevent, detect, and recover from it
Cryptojacking definition Cryptojacking is the unauthorized use of someone else’s compute resources to mine cryptocurrency. Hackers seek to hijack any kind of systems they can...
6 tips for effective security job postings (and 6 missteps to avoid)
MongoDB CISO Lena Smart wants to make a good impression on prospective employees. So she’s attentive to what goes into the ads she posts when...