stressed Horizon3.ai insider threat cybersecurity alert fatigue

Cybersecurity in 2022: It’s Not Getting Easier

As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to ...
Security Boulevard
Unauthenticated Webpages: Hidden HIPAA Risks on Public-Facing Websites

Unauthenticated Webpages: Hidden HIPAA Risks on Public-Facing Websites

| | Blog
When we think about HIPAA compliance and websites, the focus often shifts to patient portals, online scheduling systems, and other secure areas requiring user authentication. However, it’s crucial to recognize that even ...
Why the Recent Telecom Hack Underscores the Need for End-to-End Encryption

Why the Recent Telecom Hack Underscores the Need for End-to-End Encryption

|
The recent massive telecom hack by the Chinese state-sponsored group Salt Typhoon has highlighted critical vulnerabilities in traditional communication systems. The breach targeted major U.S. telecom providers, including Verizon, AT&T, and T-Mobile, ...
Microsoft Windows malware software supply chain

Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors

An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on ...
Security Boulevard
DEF CON 32

DEF CON 32 – Cultivating M4D SK1LLZ In the DEF CON Community

Authors/Presenters: Yan Shoshitaishvili, Perri Adams Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

Addressing BYOD Vulnerabilities in the Workplace

Secure the workplace of today by exploring how to address BYOD vulnerabilities Bring Your Own Device (BYOD) policies have become commonplace in many workplaces. Employees use personal smartphones, tablets, and laptops to ...
The 3 Most Common Misconceptions About Workplace Violence

The 3 Most Common Misconceptions About Workplace Violence

| | article
Learn how to overcome C-suite resistance to investing in workplace violence prevention programs — keeping your business safe and strong Introduction Misconception 1: “Don’t worry, we’ll know it when we see it.” ...
Breaking the Air Gap Through Hardware Implants

Breaking the Air Gap Through Hardware Implants

| | IoT Security
IoT security assessments expose diverse technologies, use cases, and protocols. While wireless components like WiFi and Bluetooth enhance functionality and enable features like OTA updates, they also increase the attack surface. This ...
Randall Munroe’s XKCD ‘The Maritime Approximation’

Randall Munroe’s XKCD ‘The Maritime Approximation’

| | Randall Munroe, Sarcasm, satire, XKCD
via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink ...
CVE Turns 25 -  BTS #43

BTS #43 – CVE Turns 25

| | Podcasts
In this episode, Paul Asadoorian, Alec Summers, and Lisa Olson discuss the 25th anniversary of the CVE program, its evolution, and the importance of transparency in vulnerability management. They explore the history ...

Podcast Episode 21: Interview with the University of Richmond’s CTF Winning Team

| | Unmasked Podcast
What happens when passion, talent, and opportunity collide in the university’s tech scene? Meet David Nathanson and Daniel Garay, the freshmen duo who took the University of Richmond’s Capture the Flag (CTF) ...