security bloggers network

Security Analyst Summit 2018 in Cancun – AI, ML, And The Sun

Another year, another Security Analytics Summit. This year Kaspersky gathered an amazing set of speakers in Cancun, Mexico. I presented…

3 years ago

New York Cybersecurity Regulations: An Important Step, but Still a Long Way From the GDPR

Leave it to New Yorkers to take a uniquely aggressive stand against cybercrime. Sure, the effort only protects one industry,…

3 years ago

How to Set Up AWS CloudTrail: An Important Step in Account Security

The post How to Set Up AWS CloudTrail: An Important Step in Account Security appeared first on Delta Risk.

3 years ago

SAP HANA Pentesting. Part 1: Vulnerabilities history

Three years have passed since the day when we published the details of the first vulnerability in SAP HANA. Nowadays…

3 years ago

Exploit kits: Winter 2018 review

In this Winter 2018 review, we check the pulse of exploit kits and their latest developments. Categories: Exploits Threat analysis…

3 years ago

How Universities Should Respond to Iranian Hacking Charges

Last week, news broke that an Iranian hacker network, Mabna Institute, had been systematically stealing data from universities across the…

3 years ago

Malicious Cryptomining, Evil Mining

Jérôme Segura writing at the Malwarebytes' blog, has an outstanding piece up on the site. In which, the details point…

3 years ago

Why You Should Never Pass Untrusted Data to Unserialize When Writing PHP Code

In PHP, as in every other programming language you use for web development, developers should avoid writing code that passes…

3 years ago

Choosing the Right DDoS Solution – Part II: On-Demand Cloud Service

This blog series explores the various options for DDoS protection and help organizations choose the optimal solution for themselves. The…

3 years ago

Omitting the “o” in .com Could Be Costly

Take care when typing a domain name into a browser address bar, because it's far too easy to fat-finger a…

3 years ago