DDoS attacks: Definition, examples, and techniques
What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a...
12 CISO resolutions for 2022
It’s still early days, but if this year is anything like years past, it’s safe to say CISOs will have a lot to contend with,...
Latest Proof of Concept Details How iOS Malware May Snoop on Our Devices
Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t have them. We carry so...
Fake Investor John Bernard Sinks Norwegian Green Shipping Dreams
Several articles here have delved into the history of John Bernard, the pseudonym used by a fake billionaire technology investor who tricked dozens of start-ups...
Friday Squid Blogging: Cephalopods Thirty Million Years Older Than Previously Thought
New fossils from Newfoundland push the origins of cephalopods to 522 million years ago. As usual, you can also use this squid post to talk...
FBI Issues Warning Over Iranian Cyber Company
FBI Issues Warning Over Iranian Cyber Company The Federal Bureau of Investigation (FBI) has issued a Private Industry Notice on protecting against malicious activity by...
Most Ransomware Infections are Self-installed
Most Ransomware Infections are Self-installed New research from managed detection and response (MDR) provider Expel found that most ransomware attacks in 2021 were self-installed. The finding...
Water Utilities Get 100-Day Cybersecurity Plan
Water Utilities Get 100-Day Cybersecurity Plan The United States Environmental Protection Agency (EPA) has drawn up a 100-day game plan to help protect the nation’s...
It’s Data Privacy Day: Here’s How to Stay Protected in 2022
When you logged on to your computer this morning, data privacy probably wasn’t the first thing you were thinking about. The same goes for when...
Who Wrote the ALPHV/BlackCat Ransomware Strain?
In December 2021, researchers discovered a new ransomware-as-a-service named ALPHV (a.k.a. “BlackCat“), considered to be the first professional cybercrime group to create and use a...