Protecting Your Phone from the Looming Threat of Juice Jacking

Juice jacking is causing alarm among executives, board members, and high net worth individuals, as well as federal authorities, tech pundits, and news outlets alike. This insidious form of cyberattack, known as ...
Endpoint Detection Compared

Endpoint Detection Compared

We compare endpoint security products directly using real, major threats How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a ...

Buying Campaign Contributions as a Hack

The first Republican primary debate has a popularity threshold to determine who gets to appear: 40,000 individual contributors. Now there are a lot of conventional ways a candidate can get that many ...

Healthcare breach affects millions of patients; Malicious apps found on Google Play store

We are now past the halfway point of the year, and if certain trends continue, 2023 could be another record year for a number of different cyber crimes. Blockchain analysis firm Chainalysis ...
Employee Spotlight – Joseph Pike

Employee Spotlight – Joseph Pike

We spoke to Security Analyst, Joseph Pike For this month’s employee spotlight piece, we spoke to Security Analyst and heavy metal enthusiast, Joseph Pike. How long have you been working at SE ...

Wisconsin Governor Hacks the Veto Process

In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly unique in their specificity—to change ...
Sowing Chaos and Reaping Rewards in Confluence and Jira

Sowing Chaos and Reaping Rewards in Confluence and Jira

IntroductionLet me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look ...

Millions of Louisiana, Oregon residents exposed in breach; Researchers uncover slate of fake malicious websites

As we approach the summer months, it’s important to remember cybercriminals will not be on vacation. Cyber scams are conducted throughout the year, and malicious actors may try to take advantage of ...

Secure Guardrails