Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The attribution was contained in a notice from the U.S. Treasury that announced sanctions against the Ethereum address that received the stolen funds. [Read More]
Microsoft drops a massive Patch Tuesday bundle and warns of an in-the-wild zero-day attack hitting Windows users. [Read More]
OpenSSH 9.0 has been fitted with new defaults to prevent "capture now, decrypt later" attacks linked to advancements in quantum computing. [Read More]
Mike Murray, a longtime practitioner and executive who was deeply embedded in the cybersecurity industry, passed away suddenly at the age of 46. [Read More]
Private equity firm Thoma Bravo pushes deeper into cybersecurity market with a $6.9 billion deal to acquire identity and access management powerhouse SailPoint Technologies. [Read More]
A Chinese threat actor known as Cicada (APT10, Stone Panda) has expanded its target list to include government, legal, religious, and non-governmental organizations (NGOs) in multiple countries around the world. [Read More]
Researchers have intercepted a destructive wiper malware dubbed "AcidRain" that is hitting routers and modems with digital breadcrumbs suggesting a link to the devastating Viasat hack that took down wind turbines in Germany. [Read More]
Attack surface management specialists Cyberpion has secured $27 million in early-stage funding to build technology that helps organizations manage exposure to risk. [Read More]
Threat hunters at Checkmarx raise an alarm after discovering a threat actor fully automating the creation and delivery of "hundreds of malicious packages" into the NPM ecosystem. [Read More]
The Ukraine computer emergency response team reports malicious cyber activity from Chinese threat actors following the Russian invasion. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!