News

  • How CIS Can Help You Enact Defense-in-Depth in the Cloud

    In a previous post, we introduced the concept of defense-in-depth and explained how it strengthens an enterprise’s security program against a Read More

    Read More

  • Spaf on the Morris Worm

    Gene Spafford wrote an essay reflecting on the Morris Worm of 1988—35 years ago. His lessons from then are still applicable today. Read More

    Read More

  • Google hopes to better fight malicious apps with real-time scanning on Android devices

    Google has added a new real-time app scanning capability to Google Play Protect in order to help it better protect against malicious apps installed from outside the official app store. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Cybersecurity hiring and retention challenges in 2023

    Scott Scheppers, chief experience officer for AT&T Cybersecurity, weighs on how his team is addressing the cybersecurity talent shortage. This is part one of a two-part blog. The boundaries between the physical and digital worlds are decreasing. The Internet of things (IoT), artificial intelligence, blockchain technology, and virtual reality are buzzwords that have already made…

    Read More

  • Veeam Patches Two Critical Bugs in Veeam ONE

    Two flaws have near-maximum CVSS scores Read More

    Read More

  • SIM Box Fraud to Drive 700% Surge in Roaming Scams

    Juniper Research warns telcos they need bilateral agreements in place Read More

    Read More

  • Critical Atlassian Bug Exploited in Ransomware Attacks

    Attempts to deploy Cerber variant on Confluence servers Read More

    Read More

  • Two-Factor vs. Multi-Factor Authentication: What’s the Difference?

    In recent times, the humble password’s efficacy as a security measure has come under scrutiny. With tendencies to be easily guessed, stolen, or bypassed, passwords have been deemed inadequate for securing sensitive information. Thankfully, more secure alternatives have emerged, with terms such as “two-factor” and “multi-factor” authentication gaining traction. However, these terms may seem abstract…

    Read More

  • Beware of Malicious Mobile Apps

    With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year. According to McAfee 2023 Consumer Mobile Threat Report, Clicker…

    Read More

  • Russian National Sanctioned For Virtual Currency Money Laundering

    Zhdanova reportedly utilized cash, international money laundering associates and businesses fronts Read More

    Read More

News, Advisories and much more

Exit mobile version