-
Intel Confirms Source Code Leak
PRIVACY PRIVACY Cyber-criminals could use the leaked source code to help launch attacks Read More
-
ThermoSecure: Cracking Passwords Using Finger Heat on Keyboards is Now Possible
PRIVACY PRIVACY A group of researchers have guessed 100% of six-character passwords using this attack Read More
-
Endor Labs offers dependency management platform for open source software
PRIVACY PRIVACY Endor Labs came out of stealth on Monday and launched its Dependency Lifecycle Management Platform, designed to ensure end-to-end security for open source software (OSS). The software addresses three key things—helping engineers select better dependencies, helping organizations optimize their engineering, and helping them reduce vulnerability noise. The platform scans the source code and…
-
Tenable.io: To control or not to control, that is the question
PRIVACY PRIVACY For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to implement RBAC successfully. When Tenable.io is used by multiple…
-
The Seven Main Phishing Lures of Cybercriminals
PRIVACY PRIVACY One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were…
-
Complex Impersonation Story
PRIVACY PRIVACY This is a story of one piece of what is probably a complex employment scam. Basically, real programmers are having their resumes copied and co-opted by scammers, who apply for jobs (or, I suppose, get recruited from various job sites), then hire other people with Western looks and language skills are to impersonate…
-
German Cybersecurity Chief Faces Sacking Over Possible Russia Ties
PRIVACY PRIVACY Schoenbohm accused of having maintained contacts with people involved with Russian security services Read More
-
Endpoint Detection and Response – you need it on mobile devices too
PRIVACY PRIVACY This blog was written by an independent guest blogger. Welcome to the final episode in our blog series focused on Mobile Endpoint Security. The first two episodes detailed the protections necessary to secure data accessed by remote workers (Endpoint security and remote work) and best practices for combating the threat of ransomware 5…
-
Facebook Login Details at Risk as Meta Identifies Over 400 Malicious Apps
PRIVACY PRIVACY Some of the malicious apps are able to evade detection and continue to make it onto legitimate app stores Read More
-
91% of Cyber Pros Experience Mental Health Challenges at Work
PRIVACY PRIVACY Factors contributing to mental health challenges included poor culture and the stressful nature of the work Read More