MANAGED IT

Access Granted: How the DoD Can Stay Cyber-Resilient

[ad_1] Now more than ever, it’s critical to be mission-ready for the next cyber threat. Our digital-first, post-pandemic world is…

Read More »

The SideWalk may be as dangerous as the CROSSWALK

[ad_1] Meet SparklingGoblin, a member of the Winnti family ESET researchers have recently discovered a new undocumented modular backdoor, SideWalk,…

Read More »

Are you, the customer, the one paying the ransomware demand?

[ad_1] Ransomware payments may have greater implications than you thought – and not just for the company that gave in…

Read More »

Deepfakes – the bot made me do it

[ad_1] As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what…

Read More »

Black Hat 2021: Wanted posters for ransomware slingers

[ad_1] Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware…

Read More »

Is your personal information being abused?

[ad_1] Drowning in spam? A study presented at Black Hat USA 2021 examines if sharing your personal information with major…

Read More »

My Journey from Intern to Principal Engineer

[ad_1] Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers…

Read More »

An Overall Philosophy on the Use of Critical Threat Intelligence

[ad_1] The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task…

Read More »

REvil Ransomware Uses DLL Sideloading

[ad_1] This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks…

Read More »

Hancitor Making Use of Cookies to Prevent URL Scraping

[ad_1] This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many…

Read More »
Back to top button