DNS data shows one in 10 organizations have malware traffic on their networks
During every quarter last year, between 10% and 16% of organizations had DNS traffic originating on their networks towards command-and-control (C2) servers associated with known...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking on “How to Reclaim Power in the Digital World”...
USN-5951-1: Linux kernel (IBM) vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
USN-5950-1: Linux kernel (KVM) vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
YoroTrooper Espionage Campaigns Target CIS, EU Countries
The threat actors mainly targeted organizations across Azerbaijan, Tajikistan and Kyrgyzstan Read More
Closing the Pay Gap: How Pay Parity Continues to Transform Our Workplace
Four years ago, we achieved something that few companies had — pay parity, by compensating all our employees equally for their contributions, regardless of gender....
DEV-1101 Updates Open Source Phishing Kit
The kit is written in NodeJS and has automated setup and detection evasion capabilities Read More
CISA Creates New Ransomware Vulnerability Warning Program
The Agency will warn critical infrastructure entities to enable mitigation before an incident Read More
How AI Could Write Our Laws
By Nathan E. Sanders & Bruce Schneier Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests. In some cases,...
Software supply chain attacks are on the rise — are you at risk?
Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! Attacks targeting the...