-
Google Thwarts Over 10,000 Attempts by Chinese Influence Operator
Google warned of high levels of activity from Chinese influence operator Dragon Bridge, which is increasingly experimenting with generative AI tools to create content Read More
-
Post Title
There’s some possibly good news on the ransomware front. Companies are becoming more resilient to attacks, and the ransom payments extorted from businesses by hackers are on a downward trend. Read more in my article on the Tripwire State of Security blog. Read More
-
Keep the Cloud Secure with CIS after Migrating to the Cloud
Want to stay secure after migrating to the cloud? Download our white paper to learn how three resources from the Center for Internet Security can help. Read More
-
CISOs Reveal Firms Prioritize Savings Over Long-Term Security
The data from Bugcrowd also reveals 40% of them think most firms don’t understand breach risks Read More
-
Operation First Light Seizes $257m in Global Scam Bust
The operation, orchestrated by Interpol, resulted in the arrest of 3950 suspects Read More
-
Navigating CentOS 7 EOL to Maintain Your Cloud Security
EOL for an operating system can necessitate a shift in your security efforts, as is the case with the CentOS 7 EOL. Here’s how to navigate the process. Read More
-
Majority of Critical Open Source Projects Contain Memory Unsafe Code
A CISA analysis in collaboration with international partners concluded most critical open source projects potentially contain memory safety vulnerabilities Read More
-
Security Analysis of the EU’s Digital Wallet
A group of cryptographers have analyzed the eiDAS 2.0 regulation (electronic identification and trust services) that defines the new EU Digital Identity Wallet. Read More
-
US Charges Russian Individual for Pre-Invasion Ukraine Hack
The US government is offering up to $10m for information on Amin Timovich Stigal’s location or his malicious cyber activity Read More
-
Memory Dump Analysis: Using LiME for Acquisition and Volatility for Initial Setup
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Memory dump analysis is a crucial aspect of digital forensics, offering a snapshot of a system’s volatile memory at a specific point in…