Yes, utilities use both IT and OT, but so do data centers. Way back in 2015, I interviewed several officials working at utility companies for a...
A security hole in the file-sharing feature of Slack enables malicious actors to identify users outside of the workforce messaging platform. Slack apparently has no plans...
University researchers in the US have developed a new fingerprint capturing and browser spoofing attack called Gummy Browsers. They warn how easy the attack is to...
The PurpleFox botnet has refreshed its arsenal with new vulnerability exploits and dropped payloads, now also leveraging WebSockets for C2 bidirectional communication. Although it’s mainly based...
You want to begin implementing zero trust security at your organization, but where do you start? Fortunately, because zero trust security isn’t provided by a single...
Gartner predicts that by 2025 cyberattackers will have weaponized operational technology environments to successfully harm or kill humans. Ambulances rerouted. Gas supplies were disrupted, leading to days of...
(ISC)², the US-based security certification organization, is piloting an entry-level certification that it hopes will help to diversify, and enlarge, the infosec workforce. The new certification exam is...
L0phtCrack – the venerable Windows system password auditing tool – has been released as an open-source utility. Christien Rioux (DilDog), one of the original authors of L0phtCrack while...
Axio released its 2021 State of Ransomware Preparedness report. The report reveals that organizations are not equipped to defend against ransomware due to deficiencies in implementing...
In a panel at the ISC2 Security Congress 2021, Sharon Smith, CISSP, Lori Ross O’Neil, CISSP, Aanchal Gupta and Meg West, M.S., CISSP, discussed the challenges and...