#CCSE22: The Need to Change Course in User Cybersecurity Training
Professor Steven Purnell discusses why organizations should take a completely new approach to staff security training Read More
Vulnerability in Stalkerware Apps
TechCrunch is reporting — but not describing in detail — a vulnerability in a series of stalkerware apps that exposes personal information of the victims....
How security vendors are aiding Ukraine
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyberattacks have been detected targeting Ukrainian businesses, websites and government...
Cybersecurity vendors respond to the Ukraine-Russia conflict
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyberattacks have been detected targeting Ukrainian businesses, websites and government...
pipenv-2021.5.29-7.fc37
FEDORA-2022-8a01f4e871 Packages in this update: pipenv-2021.5.29-7.fc37 Update description: Automatic update for pipenv-2021.5.29-7.fc37. Changelog * Thu Feb 24 2022 Tomas Orsava <torsava@redhat.com> - 2021.5.29-7 - Fix...
How to manage privileged users in IT
This blog was written by an independent guest blogger. Privileged users are the key to the information system. The operation of information systems and the...
How blockchain investigations work
When Colonial Pipeline was hit by ransomware on May 7, 2021, it paid 75 bitcoins to restore its systems. But the money was not entirely...
The Ukraine/Russia information war is forcing companies to choose a side
The Russian invasion of Ukraine has a very visible aspect as we see Ukrainians stand and fight the Russian military might. The geopolitical landscape is...
Ghostwriter Group Targets NATO Refugee Effort
Proofpoint warns of new phishing campaign from Belarusian state Read More
Nvidia Admits Hackers Stole Employee and Internal Data
Attackers claim to have IP which could increase capacity for crypto-mining Read More