Israeli newspapers targeted by hackers on anniversary of Iranian general’s assassination
The Jerusalem Post says that its website was defaced on Monday, and pointed the blame at pro-Iranian hackers who they said posted an illustration depicting...
New Hardened macOS 11 & 10.15 VMs in AWS Marketplace
Apple users rejoice! CIS Hardened Images for macOS Big Sur (11) and Catalina (10.15) are now available in Amazon Web Services (AWS) Marketplace. These CIS...
Technology’s contributions toward safety in healthcare
This blog was written by an independent guest blogger. Technology in healthcare has the potential to make all the difference in terms of safety outcomes....
NSA Guidance: Zero Trust Applied to 5G Cloud Infrastructure contd: Parts 3 and 4
Part 2 of a 2-part series By: Kathleen M. Moriarty, CIS Chief Technology Officer and active participant in the Critical Infrastructure Partnership Advisory Council (CIPAC)...
The Internet is for Everyone to Enjoy—We’re Helping See to It
The internet is meant for all to enjoy. And that’s who we’re looking out for—you and everyone who wants to enjoy life online. We believe it’s important that someone has your back like that, particularly...
Happy 12th Birthday, KrebsOnSecurity.com!
KrebsOnSecurity.com celebrates its 12th anniversary today! Maybe “celebrate” is too indelicate a word for a year wracked by the global pandemics of COVID-19 and ransomware....
Manual and semi-automated testing for IDORs using Burp Suite
This blog was written by an independent guest blogger. This article explores how you can locate Insecure direct object references (IDORs) using Burp Suite. Primarily,...
What’s the Difference Between Identity Fraud and Identity Theft?
What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s easy to use them nearly interchangeably. While both can take...
Threat Intelligence and Protections Update Log4Shell CVE-2021-44228
Threat Summary Log4j/Log4shell is a remote code execution vulnerability (RCE) in Apache software allowing attackers unauthenticated access into the remote system. It is found in...
Helping Older Adults Build Strong Digital Literacy Skills
Most of us take our skills for granted when it comes to technology. We move effortlessly between applications and multiple devices. We install new software, set up numerous accounts, and easily clear technical hurdles that come our way. Unfortunately, that picture isn’t the norm for many older...