Friday Squid Blogging: Squid Migration and Climate Change
New research on the changing migration of the Doryteuthis opalescens as a result of climate change. News article: Stanford researchers have solved a mystery about...
Upstart crime site woos Raid Forums orphans
A new crime site for hackers is positioning itself as an alternative to Raid Forums, a popular watering hole for threat actors before it was...
Exiger launches data-agnostic supply chain risk platform
New York-based risk management company Exiger this week launched a new supply chain risk monitoring service, designed to incorporate a wide and customizeable array of...
House Passes Better Cybercrime Metrics Act
Bill requiring FBI to report cybercrime metrics and cyber enabled crime categories clears Congress Read More
NSA Employee Accused of Sharing National Defense Secrets
Indictment alleges NSA employee used personal email account to send Top Secret info Read More
US Cyber Command Partners with APUS
American Public University System joins CYBERCOM’s Academic Engagement Network Read More
Defending Against Russian Cyber-Attacks: Guidance for SLTTs
CIS and the MS- and EI-ISACs share how U.S. state and local governments can defend themselves against Russian cyber-attacks. Read More
Police charge UK teenagers in relation to LAPSUS$ hacking group investigation
Two teenagers from the UK have been charged by police over hacking offenses in relation to an international investigation into the LAPSUS$ group. The cybercriminal...
Two teenagers charged in relation to LAPSUS$ hacking group investigation
City of London Police have charged two teenagers in relation to the ongoing investigation into the LAPSUS$ hacking group. Read More
Bypassing Two-Factor Authentication
These techniques are not new, but they’re increasingly popular: …some forms of MFA are stronger than others, and recent events show that these weaker forms...