COMMENT Imagine yourself in a bustling city, surrounded by the symphony of commerce. The exchange of goods and the flow of transportation are all around you. This is the beating…
Category: Cyber Security
Where do cyber disclosures go from here?
COMMENT In a previous article, I explained what the Securities and Exchange Commission (SEC) SolarWinds charges and the four-day rule mean for DevSecOps. Today we ask a different question: where…
Justice Department Arrests Founders of Cryptocurrency Mixer Samourai Over $2 Billion in Illegal Transactions
April 25, 2024PressroomCryptocurrency/Cybercrime The US Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer called Samourai and seized the service on charges of…
Network Threats: A Step-by-Step Attack Demonstration
Follow this real-life network attack simulation, covering 6 steps from initial access to data exfiltration. Learn how attackers stay undetected with the simplest tools and why you need more choke…
State-sponsored hackers exploit two Cisco zero-day vulnerabilities for espionage
April 25, 2024PressroomVulnerability/Zero-Day A new malware campaign exploited two zero-day flaws in Cisco networking equipment to deliver customized malware and facilitate covert data collection in targeted environments. Cisco Talos, who…
Google postpones deprecation of third-party cookies amid UK regulatory scrutiny
April 25, 2024PressroomTechnology/Privacy Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to address pending competition concerns from UK…
Hardening AI training datasets against malicious poisoning
COMMENT Picture this: It’s a Saturday morning and you’ve made breakfast for your family. The pancakes were golden brown and apparently tasted good, but everyone, including you, got sick shortly…
What makes Starmus unique? A Q&A with award-winning director Todd Miller
video The director of the Apollo 11 film shares his views on the role of technology in addressing pressing global challenges and explains why he got involved with Starmus. April…
CrushFTP Zero-Day Cloud Exploit Targets US Organizations
Virtual file transfer system provider CrushFTP and various security researchers are raising the alarm about a escape from the sandbox flaw in the CrushFTP server that attackers have already exploited…
Attacker social engineering backdoor code in XZ Utils
An adversary does not need sophisticated technical expertise to execute a broad software supply chain attack like those pioneered by SolarWinds and CodeCov. Sometimes, all it takes is a little…