Cyber Security

Security Is a Process, Not a Tool

The cybersecurity industry constantly says we need new tools to make our organizations secure. BYOD? You need mobile device management (MDM) and endpoint...

.US Harbors Prolific Malicious Link Shortening Service – Krebs on Security

The top-level domain for the United States — .US — is home to thousands of newly-registered domains tied to a malicious link shortening...

Navigating the security and privacy challenges of large language models

Business Security Organizations that intend to tap into the potential of LLMs...

Australian Nonprofit Cyber Security Is So Poor It Might Be Affecting Donations

The not-for-profit sector is one of Australia’s biggest employers and revenue sources. 1.4...

Cybersecurity hiring and retention challenges in 2023

Scott Scheppers, chief experience officer for AT&T Cybersecurity, weighs on how his team is addressing the cybersecurity talent shortage. This is part one...

Identifying Group Policy attacks – Sophos News

In this post we will be discussing Group Policy attacks, basing the threat hunt on a ransomware investigation undertaken by the Sophos X-Ops...

Trolls, military data, and the hitman and her • Graham Cluley

A woman’s attempt to hire an assassin online backfires badly, it’s scary just how cheap it is to buy information about US military...

Qualified certificates with qualified risks

Posted by Chrome Security team Improving the interoperability of web services is an important and worthy goal. We believe that it should be easier...

Latest articles