U.S. Warns Against North Korean Hackers Posing as IT Freelancers
Highly skilled software and mobile app developers from the Democratic People’s Republic of Korea (DPRK) are posing as “non-DPRK nationals”…
XDR Isn’t Enough to Protect Your Organization: The Importance of Adversary Detection and Response
It’s more difficult than ever to protect our infrastructure, government, and businesses from becoming victims of well-funded, skilled adversaries. From…
5 tips for building your innovation ecosystem
In their quest for IT innovation, CIOs need to look beyond the typical “most innovative companies” lists. Innovation today is…
KurayStealer – Tool Sold to Criminals that Have Password Stealing and Screenshot Capabilities
There was an advertisement by a discord user with the handle “Portu” that exploded over the internet on April 23rd,…
Good News…Security Culture is Improving Around the World
A new industry report evaluating the level of security culture worldwide has found a positive improvement overall. The 2022 Security…
Tableau adds data storytelling to its revamped cloud platform
Tableau wants to make it easier for enterprise users to tell stories using their data with a set of new…
Ransomware victims receive threatening phone calls and 9 in 10 firms repay ransom
Wizard Spider, a Russian criminal gang, is reportedly hiring cold callers to threaten ransomware victims into paying up. Highly placed…
North Korean devs go undercover to aid DPRK hackers
US authorities have warned that the Democratic People’s Republic of Korea (DPRK) is sending IT workers to get freelance jobs…
HP beefs up the Omen 16 gaming laptop, announces new $799 Victus 15 for budget gamers
The new HP Omen 16 features the same 16:9 aspect ratio, resolution and refresh rates as last year’s model, packing…
How Cybersecurity is Changing in the Post-Pandemic Era
By Liam O’Murchu, Director, Security Technology and Response The last few years have been anything but normal for everyone. As…
Transforming SQL Queries Bypasses WAF Security
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.source
Noctua-equipped Asus GeForce RTX 3080 graphics card is official
Last year, Asus partnered with Noctua to produce a custom design for Nvidia’s GeForce RTX 3070 graphics card. The result…
Researchers find new way to hack any iPhone even when it’s turned off
Cybersecurity experts published a research detailing how Bluetooth, Near Field Communication (NFC) and Ultra-wideband (UWB) wireless features on iPhone devices…
CISA, Int’l Cybersecurity Bodies Issue Advisory to MSPs
The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with four international security organizations including the United Kingdom’s National Cyber…
Google Will Use Mobile Devices to Thwart Phishing Attacks
In an effort to combat phishing, Google will allow Android phones and iPhones to be used as security keys.source
CEO of cryptocurrency exchange FTX believes that Bitcoin has no future as a payments network
In a Monday interview, crypto billionaire Sam Bankman-Fried said that he doesn’t see a future for Bitcoin as a payments…
TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft
MDR Sentinel expands TorchLight’s leading managed detection and response (MDR) services with turnkey SIEM and SOAR capabilities from Microsoft; TorchLight…
These 'portable gaming' XR glasses have raised $2.5 million on Kickstarter, more than the Oculus Rift
The Virtue One XR glasses offer the sort of virtual screen we’ve seen in similar VR/AR devices, but these claim…
NIST Updates: What You Need to Know
The National Institute of Standards and Technology (NIST) is a United States federal agency concerned with American competitiveness and industrial…
Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity…