What Are Conversation Overflow Cyberattacks and How Do They Work?

AI has been instrumental in the fight against cybercrime. Machine learning algorithms are far more ...
How to Migrate AWS PostgreSQL RDS to Aurora Using Terraform

How to Migrate AWS PostgreSQL RDS to Aurora Using Terraform

| | Industry Insights
6 min read This summary covers key migration steps, Terraform integration, and strategies for handling costs and backups. The post How to Migrate AWS PostgreSQL RDS to Aurora Using Terraform appeared first ...
SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos

SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos

| | library, White Paper
Discover the Cutting-Edge of Cybersecurity in the “SANS 2024 Threat Hunting Survey: Hunting for Normal Within Chaos” Are you navigating the complexities of threat hunting in today’s chaotic cyber landscape? SANS’s ninth ...

The Cool Evolution: Liquid Cooling in Data Centers

| | Infrastructure
In the high-stakes, high-tech world of data centers, one trend is making waves—and chills—across the industry. Liquid cooling, once a novelty, is rapidly becoming a mainstream solution for keeping the data-driven planet ...
Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

This blog details how Obsidian detects and blocks the latest version of Tycoon, an adversary-in-the-middle (AiTM), Phishing-as-a-Service (PhaaS) platform that leverages a reverse proxy to intercept and replay credentials and MFA prompts ...

USENIX Security ’23 – Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation

Authors/Presenters: *Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib* Many thanks to USENIX for publishing their outstanding ...
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management ...

NIST CSF 2.0 – Top 10 Things You Should Know

| | assessment, Axio Insights, NISTCSF2.0
This article was written by Brian Benestelli and John Fry In the decade since the initial release of the Cybersecurity Framework (CSF), it has become one of the most widely Read More ...
Randall Munroe’s XKCD ‘The Wreck of the Edmund Fitzgerald’

Randall Munroe’s XKCD ‘The Wreck of the Edmund Fitzgerald’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink ...