Friday, September 25, 2020
Who Owns Open Source Security?
The High Cost of Reporting a Non-Reportable Data Breach
Apps on Google Play Tainted with Cerberus Banker Malware
New on Sonatype Learn: Outcome-based Training, New Courses, and a New Look!
IPv4 and IPv6 Overview
The Home of the Security Bloggers Network
Community Chats Webinars Library
Security Bloggers Network
Syndicate Your Blog
Write for Security Boulevard
Security Boulevard Chat
Marketing InSecurity Podcast
IoT / ICS
Threats / Breaches
Blockchain / Digital Currencies
The Masquerade Ball: Train Yourself to Detect Spoofed Files
October 29, 2018
IT Security and Data Protection
Masquerading is a technique used in which a file name is maliciously named something similar to one which may be trusted. This specific technique is outlined in detail in the MITRE ATT&CK ...
The State of Security