Month: March 2021
-
Top 5 Attack Techniques May Be Easier to Detect Than You Think
Despite the intimidating nature of the threat landscape, organizations can achieve considerable defense in depth by monitoring a relatively …
-
Smashing Security podcast #221: God bless his hairy palms
FatFace stumps up $2 million to its ransomware extortionists, an IT administrator is caught with his pants down, Mobikwik blames its users …
-
Cohesity announces valuation of $3.7B following a growth in annual recurring revenues
Cohesity announced a new company valuation of $3.7 billion, which is $1.2 billion higher than its valuation less than 12 months ago. This …
-
US nuclear command agency’s gibberish tweet was sent by a child
When an unintelligible tweet like that was made by the US Strategic Command’s Twitter account at the weekend, …
-
North Korea-linked hackers target security experts again
Researchers from Google’s Threat Analysis Group (TAG) reported that North Korea-linked hackers are targeting security researchers via …
-
Google Updates on Campaign Targeting Security Researchers
Google’s Threat Analysis Group (TAG) today shared an update on a campaign that has been targeting security researchers on social media and …
-
Biden’s Infrastructure Plan: 3 Cybersecurity Provisions
Projects with potential cybersecurity components included in a $2 trillion infrastructure spending proposal that the Biden administration …
-
Cybercrime in the US jumped by 55% in the past two years
Cybercrime is on the rise as hackers continue to steal data, disrupt business and cause harm online. The result is billions of dollars in losses: …
-
Fraud Ring Launders Money Via Fake Charity Donations
A money-laundering fraud ring is targeting donation sites, taking advantage of the outpouring of charity sparked by the global pandemic. …
-
Solo.io: Istio Is Winning the Service Mesh War
The open source Istio has emerged as the “dominant” service mesh to manage microservices and Kubernetes environments, solo.io …
-
83% of Businesses Hit With a Firmware Attack in Past Two Years
Firmware attacks targeting enterprises are up over the past two years. However, most victims are too preoccupied with patches and upgrades …
-
7 ways to improve security of your machine learning workflows
Figure 2: Comparison between neural network classifications of legitimate samples (top row) and their corresponding adversarial samples …
●●●