The 2020 Insider Threat Report is Here

More than ever, organizations are under continuous cyberattack from nation-state and professional criminal hackers. So,... The post The 2020 Insider Threat Report is Here appeared first on Gurucul ...

Be afraid … Be very afraid

It seems ironic that Halloween marks the final day of National Cybersecurity Awareness Month (NCSAM). The... The post Be afraid … Be very afraid appeared first on Gurucul ...

Cybersecurity Horror Stories Don’t Have to Keep You Up at Night

Iconic filmmaker John Carpenter once said this about horror flicks: “There are two different stories... The post Cybersecurity Horror Stories Don’t Have to Keep You Up at Night appeared first on Gurucul ...
XKCD User Forum Data Breach

XKCD User Forum Data Breach

Bad news for XKCD user forum members - all 562,000 of them - reports Sergiu Gatlan (writing for Bleeping Computer) in a blog post on September 3rd; as email addresses, user names ...
LinkedIn's Bad Behaviors, The Data Exfiltration Gambit

LinkedIn’s Bad Behaviors, The Data Exfiltration Gambit

Bad Behaviors should not be tolerated... Behold, and examine, if you will, the data exfiltrated (in this case, the inventory of extensions installed in your broweser, and data contained therein) by Linkedin ...

Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft

You might be on vacation, but the malicious hackers and cybercriminals are not. They are always... The post Travel Tips to Keep You Safe from Cybercrime, Fraud & Identity Theft appeared first ...
machine learning for cybersecurity FI

How Machine Learning for Cybersecurity Can Thwart Insider Threats

While there are innumerable cybersecurity threats, the end goal for many attacks is data exfiltration. Much has been said about using machine learning to detect malicious programs, but it’s less common to ...
NFCdrip: Data Exfiltration Research in Near Field Communication

NFCdrip: Data Exfiltration Research in Near Field Communication

Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless ...
Hack.lu 2018: Mind The (Air)Gap - Erez Yalon and Pedro Umbelino

Smart Bulb Offers Light, Color, Music, and… Data Exfiltration?

Smart bulbs are widely known as a successful offering in home automation and IoT products, as they are internet-capable light bulbs that allow home users to customize the colors, schedule on and ...
NFCdrip: Watch the full out of band data exfiltration proof of concept

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one ...
Loading...