-
#InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs
PRIVACY PRIVACY Geoff White also touched upon the emerging world of cryptocurrency theft Read More
-
Explore Cloud Security with CIS at AWS re:Inforce 2022
PRIVACY PRIVACY CIS Hardened Images can assist with your cloud security. That’s one of the messages we’re bringing to AWS re:Inforce 2022. Read More
-
#InfosecurityEurope2022: Security awareness must be in the moment
PRIVACY PRIVACY Annual or quarterly security training will not protect organizations from phishing and other human threats Read More
-
5 social engineering assumptions that are wrong
PRIVACY PRIVACY Social engineering is involved in the vast majority of cyberattacks, but a new report from Proofpoint has revealed five common social engineering assumptions that are not only wrong but are repeatedly subverted by malicious actors in their attacks. Commenting on the report’s findings, Sherrod DeGrippo, Proofpoint’s vice president threat research and detection, stated…
-
On the Dangers of Cryptocurrencies and the Uselessness of Blockchain
PRIVACY PRIVACY Earlier this month, I and others wrote a letter to Congress, basically saying that cryptocurrencies are an complete and total disaster, and urging them to regulate the space. Nothing in that letter is out of the ordinary, and is in line with what I wrote about blockchain in 2019. In response, Matthew Green…
-
Does an iPhone Need Antivirus Software?
PRIVACY PRIVACY If you’re one of the countless Apple iPhone owners out there, there’s a good chance that one of the reasons you love your smartphone is because you’ve heard that Apple devices tend to have fewer vulnerabilities to viruses. Because of their shared operating system, iOS devices enjoy Apple’s security measures, which keeps them…
-
Conti Group Compromised 40 Firms in Just One Month
PRIVACY PRIVACY Defunct ransomware operation was one of the most aggressive Read More
-
Unsecured APIs Could Be Costing Firms $75bn Per Year
PRIVACY PRIVACY New research uncovers major enterprise security gaps Read More
-
Euro Police Target Gangs Grooming Ukrainian Refugees Online
PRIVACY PRIVACY Fifteen new investigations opened after reports of human trafficking Read More
-
Open-source software risks persist, according to new reports
PRIVACY PRIVACY Open-source software (OSS) has become a mainstay of most applications, but it has also created security challenges for developers and security teams, challenges that may be overcome by the growing “shift left” movement, according to two studies released this week. More than four out of five organizations (41%) don’t have high confidence in…