Cybersecurity Professionals Weigh In On What to Expect in 2019

Cybersecurity Professionals Weigh In On What to Expect in 2019

2019 is underway. Two weeks down, fifty to go. Technology continues to evolve rapidly and the threat landscape is constantly shifting. It’s challenging for organizations to try and stay a step ahead ...
Windows VCF Zero-Day Exploit Allows Remote Code Execution

Windows VCF Zero-Day Exploit Allows Remote Code Execution

A new unpatched vulnerability in Windows has been disclosed along with proof-of-concept exploit code. It could allow hackers to more easily install malware on computers, but it requires user interaction. The vulnerability ...
Security Boulevard
Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

…and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of ...
Threat Alert: MalSpam

Threat Alert: MalSpam

Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States. These campaigns are designed to commit fraud via credential theft by sending MalSpam, malicious spam ...
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Book Summary)

Step-by-step personal cybersecurity guidance from the book "Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals" by Bart R. McDonough ...
Humans Alone Can’t Stop Today’s Bots

Why Humans Alone Can’t Stop Today’s Bots

Bot management is a never-ending game of cat and mouse Traditionally, botnets were used to launch Layer 3 and Layer 4 DDoS attacks. They would exploit vulnerabilities on connected servers and other ...
Security Boulevard

Newspaper Ransomware Attack, How Facebook Tracks You on Android, USB-Type-C Authentication – WB50

Watch this episode on our YouTube Channel! This is the 50th episode of the Shared Security Weekly Blaze for January 7th 2019 with your host, Tom Eston. In this week’s episode: Newspaper ...
The Great Pyramid of CASB

Cornerstone Capabilities of Cloud Access Security Brokers

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) ...
10 Most Popular Blogs of 2018

10 Most Popular Blogs of 2018

Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to write about this year. Of the hundreds of ...
Loading...