Smashing Security podcast #258: Tesla remote hijacks and revolting YouTubers
Carole's still on jury service, but the show must go on! We take a look at how some Tesla owners are at risk of having...
Applications Open for Next NCSC for Startups Cohort
Applications Open for Next NCSC for Startups Cohort Applications have opened for the latest NCSC for Startups program, which is focusing on companies developing products...
NFTs – Protecting the investment
This blog was written by an independent guest blogger. Non-fungible tokens (NFTs) are the new player in the financial investment market. They’ve seen tremendous interest...
Twitter Mentions More Effective Than CVSS at Reducing Exploitability
Twitter Mentions More Effective Than CVSS at Reducing Exploitability Monitoring Twitter mentions of vulnerabilities may be twice as effective as CVSS scores at helping organizations...
Eleven Arrested in Bust of Prolific Nigerian BEC Gang
Eleven Arrested in Bust of Prolific Nigerian BEC Gang Nigerian police have arrested 11 more suspected members of a prolific business email compromise (BEC) gang that...
Red Cross: Supply Chain Data Breach Hit 500K People
Red Cross: Supply Chain Data Breach Hit 500K People The International Committee of the Red Cross (ICRC) has revealed a major data breach that compromised the...
BadUSB explained: How rogue USBs threaten your organization
In January 2022, the FBI issued a public warning over a USB attack campaign in which numerous USB drives, laced with malicious software, were sent...
What CISOs can learn about insider threats from Iran’s human espionage tactics
Over the last few months, there has been an uptick of espionage revelations concerning Iran and its interest in collecting information against regional adversaries as...
INTERPOL and Nigerian Police bust business email compromise ring, arrest 11
INTERPOL and the Nigerian Federal Police today announced the arrests of 11 business email compromise (BEC) actors in Nigeria as part of an international operation...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...