Like many other security processes, penetration testing and threat hunting are often incorrectly equated. However, the difference between the two is that between prevention and detection.
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools
October 14, 2021
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.
Throughout the past two years, supply chain professionals have experienced the national and international disruptions that can occur as a result of cyberattacks, with some threats completely halting certain sectors.
While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..
Pen Test Partners shared news that BrewDog exposed the details of more than 200,000 ‘Equity for Punks’ shareholders for over 18 months, along with many more customers.
5G is here and redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important. Who ultimately is responsible for its associated security?
As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Cyentia Institute and RiskRecon released research that quantifies how a multi-party data breach impacts many other organizations in today’s interconnected digital world.