Trump considers clemency for Silk Road founder The Daily’s Beast’s sources say the White House counsel’s office has had documents related to the case of…
Here’s a six minute highlights video of last week’s CISO Series Video Chat: “Hacking SaaS Security: An hour of critical thinking on on cloud application policy,…
Microsoft seizes SolarWinds domain – quarantine starts today The move was made to seize and sinkhole the avsvmcloud[.]com domain that played a central role in…
SolarWinds Orion carrying malware The company said updates to its IT management platform between March and June may have carried malware as a result of…
Adrozek malware can infect over 30K Windows PCs a day This new credential-stealing malware injects ads into search engine results pages often on top of…
For CISOs and other security leaders, suffering from imposter syndrome seems inevitable. How can you ever be really confident when there’s an endless stream of…
The Cybersecurity community responds to FireEye hack On Tuesday, FireEye revealed it was hacked and its “Red Team” software it uses for penetration testing was…
Microsoft’s December 2020 Patch Tuesday fixes 58 vulnerabilities With the December 2020 Patch Tuesday security updates release, Microsoft has released fixes for 58 vulnerabilities and…
Google publishes cross-site leaks wiki This site is set up as an open knowledge base where researchers can share new information about cross-site leaks. At…
Here’s a preview of this Friday’s [December 11th, 2020] CISO Series Video Chat for “Hacking SaaS Security: An hour of critical thinking on on cloud application…
Drug dealers offer Pfizer vaccine on the Dark Web With the United Kingdom becoming the first Western country to authorize a Covid-19 vaccine and announce…
Spotify celebrity pages defaced to plug Trump, Taylor Swift A hacker has vandalized Spotify’s list of the year’s most popular songs. The hacker, who goes…
Please join us Friday, December 18th, 2020 for “Hacking the Crown Jewels: An hour of understanding what data you have, what’s REALLY important, where it resides,…
After publishing the article, “22 Effective Information Security Risk Management Techniques,” I asked the community for their feedback. What did they like, not like, and…
Malicious hackers target the Covid-19 vaccine ‘cold chain’ As the world waits for the COVID-19 vaccine, a very complex distribution process is underway that requires…
With every cybersecurity breach, we still don’t seem to be getting through. Many companies don’t seem to be taking cybersecurity seriously. What does it take?…
US Supreme Court eyes narrowing of CFAA Continuing a story we covered on Monday, the Supreme Court has indicated serious reservations about the ambiguity and…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.