News

  • Intel Confirms Source Code Leak

    PRIVACY PRIVACY Cyber-criminals could use the leaked source code to help launch attacks Read More

    Read More

  • ThermoSecure: Cracking Passwords Using Finger Heat on Keyboards is Now Possible

    PRIVACY PRIVACY A group of researchers have guessed 100% of six-character passwords using this attack Read More

    Read More

  • Endor Labs offers dependency management platform for open source software

    PRIVACY PRIVACY Endor Labs came out of stealth on Monday and launched its Dependency Lifecycle Management Platform, designed to ensure end-to-end security for open source software (OSS). The software addresses three key things—helping engineers select better dependencies, helping organizations optimize their engineering, and helping them reduce vulnerability noise. The platform scans the source code and…

    Read More

  • Tenable.io: To control or not to control, that is the question

    PRIVACY PRIVACY For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to implement RBAC successfully. When Tenable.io is used by multiple…

    Read More

  • The Seven Main Phishing Lures of Cybercriminals

    PRIVACY PRIVACY One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were…

    Read More

  • Complex Impersonation Story

    PRIVACY PRIVACY This is a story of one piece of what is probably a complex employment scam. Basically, real programmers are having their resumes copied and co-opted by scammers, who apply for jobs (or, I suppose, get recruited from various job sites), then hire other people with Western looks and language skills are to impersonate…

    Read More

  • German Cybersecurity Chief Faces Sacking Over Possible Russia Ties

    PRIVACY PRIVACY Schoenbohm accused of having maintained contacts with people involved with Russian security services Read More

    Read More

  • Endpoint Detection and Response – you need it on mobile devices too

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Welcome to the final episode in our blog series focused on Mobile Endpoint Security.  The first two episodes detailed the protections necessary to secure data accessed by remote workers (Endpoint security and remote work) and best practices for combating the threat of ransomware 5…

    Read More

  • Facebook Login Details at Risk as Meta Identifies Over 400 Malicious Apps

    PRIVACY PRIVACY Some of the malicious apps are able to evade detection and continue to make it onto legitimate app stores Read More

    Read More

  • 91% of Cyber Pros Experience Mental Health Challenges at Work

    PRIVACY PRIVACY Factors contributing to mental health challenges included poor culture and the stressful nature of the work Read More

    Read More

News, Advisories and much more

Exit mobile version