The year is 2007, the iPhone 1 has just been released, and many of us are still bound to desktop computers on office desks. Over the...
Given current headlines, one might think that every organization must be in a continual state of cyberwarfare. Everywhere we look, we are under siege. On one...
A large-scale unauthenticated scraping of publicly available and non-secured endpoints from older versions of Prometheus event monitoring and alerting solution could be leveraged to inadvertently leak...
Traditional cybersecurity practices relied on the age-old maxim, an ounce of prevention is better than a pound of cure. But here’s the biggest truth about modern...
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools...
Thoughtful investment in cybersecurity measures goes beyond technology. Not only are digital tools and updated software important, but IT professionals are also essential in building resilient...
It’s an ongoing battle; every year or two, there is a new policy proposal to authorize private-sector hack back and 2021 is no exception. The concept...
Pen Test Partners shared the news that BrewDog exposed the details of more than 200,000′ Equity for Punks’ shareholders for over 18 months, along with many more customers....
In the opening column of this series, “Emerging Technology, Evolving Threats,” [check out Part I here and Part II here], I wrote about quantum computing —...
The pandemic has undeniably altered various things in our lives, whether it be personally or professionally. But cybersecurity is currently seeing the biggest shifts of all,...
Recent Comments