News

  • Align to a Framework: Plan a Cybersecurity Roadmap’s Route

    PRIVACY PRIVACY Once you have an idea of where you are, you can decide where you want to go. A security framework is invaluable for this type of work. Read More

    Read More

  • Friday Squid Blogging: Creating Batteries Out of Squid Cells

    PRIVACY PRIVACY This is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail underneath its tentacle, it needs to regrow that tooth very rapidly, otherwise it can’t claw its prey,” he explains. This was intriguing news ­ and it sparked an idea in Hopkins lab where he’d been…

    Read More

  • A Hacker’s Mind News

    PRIVACY PRIVACY My latest book continues to sell well. Its ranking hovers between 1,500 and 2,000 on Amazon. It’s been spied in airports. Reviews are consistently good. I have been enjoying giving podcast interviews. It all feels pretty good right now. You can order a signed book from me here. For those of you in…

    Read More

  • Critical flaw in WooCommerce can be used to compromise WordPress websites

    PRIVACY PRIVACY WooCommerce, a popular plug-in for running WordPress-based online stores, contains a critical vulnerability that could allow attackers to take over websites. Technical details about the vulnerability have not been published yet, but the WooCommerce team released updates and attackers could reverse-engineer the patch. “Although what we know at this time is limited, what…

    Read More

  • Spot and Remove Viruses from Your Android Phone

    PRIVACY PRIVACY So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to spot and remove them from your phone.  A couple things make Android phones attractive to cyber criminals and scammers. First, they make up about half of all smartphones in the U.S. and roughly…

    Read More

  • CISA Unveils Ransomware Notification Initiative

    PRIVACY PRIVACY Provides businesses with early warnings to evict threat actors before they can encrypt data Read More

    Read More

  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites

    PRIVACY PRIVACY The vulnerability could allow an unauthenticated attacker to gain admin privileges and take over a website Read More

    Read More

  • GitHub Updates Security Protocol For Operations Over SSH

    PRIVACY PRIVACY The move reportedly did not stem from a compromise of GitHub systems or customer information Read More

    Read More

  • Cyberpion rebrands as Ionix, offering new EASM visibility improvements

    PRIVACY PRIVACY SaaS-based external attack surface management (EASM) company Cyberpion has rebranded as Ionix, at the same time adding a clutch of new cybersecurity capabilities to its namesake offering. Designed to provide a “wider coverage and deeper focus” into its customers’ internet-facing assets and connected dependencies, the revamp of Ionix’s system will feature new abilities…

    Read More

  • Mobile Myths: Can My Apple Devices Get Hacked?

    PRIVACY PRIVACY “I bought a Mac, because it’s safer than a PC.”  “I always surf the web with my iPhone, because I know it can’t get infected.”  “I got a virus on my first PC, so now I only use Apple products.”  Sound familiar?  Too often, the rhetoric around the Mac vs. PC debate focuses…

    Read More

News, Advisories and much more

Exit mobile version