CISA Releases SSVC Guide to Help Companies Prioritize Vulnerabilities
Remediation efforts are prioritized based on exploitation status, safety impact and prevalence criteria
Cyber News, Cyber Threat TrendsRemediation efforts are prioritized based on exploitation status, safety impact and prevalence criteria
Cyber News, Cyber Threat TrendsA bit like leaving the front door keys under the doormat…
Cyber News, Cyber Threat TrendsMikhail Vasiliev was apprehended in Canada and is in custody awaiting extradition to the US
Cyber News, Cyber Threat TrendsThey left quoting concerns about the rollout of new features without an FTC consent decree
Cyber News, Cyber Threat TrendsPoor thing…I hope it gets better Continue reading on The CISO Den »
Cyber News, Cyber Threat TrendsTwo long-running surveillance campaigns have been found targeting the Uyghur community in China and elsewhere with Android spyware tools designed to harvest sensitive information and track their whereabouts. This encompasses a previously undocumented malware strain called BadBazaar and updated variants of an espionage artifact dubbed MOONSHINE by researchers from the University of Toronto’s
Cyber News, Cyber Threat TrendsWhen you are trying to get another layer of cyber protection that would not require a lot of resources, you are most likely choosing between a VPN service & a DNS Security solution. Let’s discuss both. VPN Explained VPN stands for Virtual Private Networks and basically hides your IP and provides an encrypted server by […]
Cyber News, Cyber Threat TrendsACM.108 How to inspecting traffic flows and troubleshoot VPC Endpoint connections This is a continuation of my series on Automating Cybersecurity Metrics. This post is long and detailed. You are really going to get your money’s worth! If you want a summary of what we discover in this post, jump to the end. If you […]
Cyber News, Cyber Threat TrendsSharon Conheady discusses the ethical and legal dilemmas often faced by social engineering testers
Cyber News, Cyber Threat Trends