Reports - Tagged - Security Boulevard
Beware password-spraying fancy bears

Beware password-spraying fancy bears

| | Reports
A collection of three- and four- letter agencies have issued a report about a sustained GRU operation against "enterprise and cloud environments". Categories: Reports (Read more...) The post Beware password-spraying fancy bears ...

Insurance and Ransomware

As ransomware becomes more common, I’m seeing more discussions about the ethics of paying the ransom. Here’s one more contribution to that issue: a research paper that the insurance industry is hurting ...

Babuk ransomware builder leaked following muddled “retirement”

Heads are being scratched after the Babuk ransomware builder appears on VirtuTotal, adding to the gang's reputation for confusion. Categories: RansomwareReports Tags: BabukdecryptionMPDraassource codevirustotal (Read more...) The post Babuk ransomware builder leaked ...

Fired by algorithm: The future’s here and it’s a robot wearing a white collar

A Bloomberg investigation has revealed that Amazon Flex drivers are being evaluated, and in some cases fired, by algorithms. Categories: Reports Tags: AIalgorithmamazonamazon.comBotWFH (Read more...) The post Fired by algorithm: The future’s ...

Banning Surveillance-Based Advertising

The Norwegian Consumer Council just published a fantastic new report: “Time to Ban Surveillance-Based Advertising.” From the Introduction: The challenges caused and entrenched by surveillance-based advertising include, but are not limited to: ...
™

Cybersecurity Insiders – 2021 Malware Report

The post Cybersecurity Insiders - 2021 Malware Report appeared first on Digital Defense, Inc ...
TAG Cyber Evaluation: Frontline Vulnerability Manager™

TAG Cyber Evaluation: Frontline Vulnerability Manager™

| | Reports, Resources
The post TAG Cyber Evaluation: Frontline Vulnerability Manager™ appeared first on Digital Defense, Inc ...

The Problem with Treating Data as a Commodity

Excellent Brookings paper: “Why data ownership is the wrong approach to protecting privacy.” From the introduction: Treating data like it is property fails to recognize either the value that varieties of personal ...
TAG Cyber Evaluation: Frontline Vulnerability Manager™

TAG Cyber Evaluation: Frontline Vulnerability Manager™

The post TAG Cyber Evaluation: Frontline Vulnerability Manager™ appeared first on Digital Defense, Inc ...

Router Security

This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security. Conclusion: Our analysis showed that Linux ...