News

  • API security: 12 essential best practices to keep your data & APIs safe

    PRIVACY PRIVACY This blog was written by an independent guest blogger. If you don’t think API security is that important, think again. Last year, 91% of organizations had an API security incident. The proliferation of SOAP and REST APIs makes it easy for organizations to tailor their application ecosystems. But, APIs also hold the keys…

    Read More

  • Cyber-Criminals Smuggle Ukrainian Men Across Border

    PRIVACY PRIVACY Researchers also warn of surge in travel-related fraud Read More

    Read More

  • Global Police Arrest Thousands in Fraud Crackdown

    PRIVACY PRIVACY Interpol claims to have intercepted $50m in illicit funds Read More

    Read More

  • Corporate Network Access Selling for Under $1000 on Dark Web

    PRIVACY PRIVACY RDP is the main access vector for brokers Read More

    Read More

  • Sigma rules explained: When and how to use them to log events

    PRIVACY PRIVACY A typical corporate network consists of hundreds or thousands of devices generating millions of lines of logs pouring in every minute. What can make it possible, then, for SOC and threat intel analysts to sift through all this flow of information efficiently and separate malicious activity from daily noise in an automated fashion?…

    Read More

  • We don’t need another infosec hero

    PRIVACY PRIVACY There’s this belief among a lot of security professionals that we are special, in that we are the defenders of our companies.  We like to think we hold ourselves to a higher standard of care than our coworkers.  If not for us, the thinking goes, our companies would crash and burn in horrible…

    Read More

  • Location data poses risks to individuals, organizations

    PRIVACY PRIVACY The market for you and your device’s location is enormous and growing. That data is collected by your network provider, by apps on your smart devices, and by the websites with which you engage. It is the holy grail of marketing, and infosec’s nightmare.  Companies that produce location-tracking algorithms and technological magic are riding…

    Read More

  • Smashing Security podcast #279: Encrypted notes, and a deadly case of AirTag spying

    PRIVACY PRIVACY How did a saxophonist sneak sensitive information in and out of the Soviet Union? How might an Apple AirTag have led to murder? And isn’t the world of cryptocurrency and blockchain doing just great? All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security…

    Read More

  • Nebulon bakes bare-metal Linux ransomware protection into the bootloader

    PRIVACY PRIVACY Smart infrastructure vendor Nebulon today announced that its latest offerings provide newly hardened backups for configuration and snapshots, in an effort to add a new tool to the antiransomware arsenal for Linux systems. The idea, according to Nebulon, is to protect against the problem of misconfigured servers and dated server configurations in Linux…

    Read More

  • Why Consider a Career in Cybersecurity?

    PRIVACY PRIVACY As technology evolves and cybersecurity threats continue to grow, the need for qualified cybersecurity candidates only intensifies. Read More

    Read More

News, Advisories and much more

Exit mobile version