Blog
Navigating third-party risks
Strategies for mitigating external access vulnerabilities and safeguarding sensitive data Webinar As organizations increasingly rely on third-party contractors, vendors, and service providers, the security risks associated with third-party access can become a top priority.…
Crook breaks into AI biz, points $250K wire payment at their own account
Fastidious attacker then tidied up email trail behind them A Maryland AI company has confirmed to the Securities and Exchange Commission (SEC) that it lost $250,000 to a misdirected wire payment.…
Join in the festive cybersecurity fun
Get hands-on cybersecurity training this seasonal challenge Sponsored Post Are you ready to pit your wits against the cyber exercises featured in the Holiday Hack Challenge 2024: Snow-maggedon?…
iOS 18 added secret and smart security feature that reboots iThings after three days
Security researcher's reverse engineering effort reveals undocumented reboot timer that will make life harder for attackers Apple's latest mobile operating system, iOS 18, appears to have added an undocumented security feature that reboots devices if they’re not used for 72 hours.…
Sweden’s ‘Doomsday Prep for Dummies’ guide hits mailboxes today
First in six years is nearly three times the size of the older, pre-NATO version Residents of Sweden are to receive a handy new guide this week that details how to prepare for various types of crisis situations or wartime should geopolitical events threaten the country.…
Deepen your knowledge of Linux security
Event The security landscape is constantly shifting. If you're running Linux, staying ahead may rely on understanding the challenges - and opportunities - unique to Linux environments.…
Teen serial swatter-for-hire busted, pleads guilty, could face 20 years
PLUS: Cost of Halliburton hack disclosed; Time to dump old D-Link NAS; More UN cybercrime convention concerns; and more Infosec in brief A teenager has pleaded guilty to calling in more than 375 fake threats to law enforcement, and now faces years in prison.…
Will passkeys ever replace passwords? Can they?
Here's why they really should Systems Approach I have been playing around with passkeys, or as they are formally known, discoverable credentials.…
Rust haters, unite! Fil-C aims to Make C Great Again
It's memory-safe, with a few caveats Developers looking to continue working in the C and C++ programming languages amid the global push to promote memory-safe programming now have another option that doesn't involve learning Rust.…
Swiss cheesed off as postal service used to spread malware
QR codes arrive via an age-old delivery system Switzerland's National Cyber Security Centre (NCSC) has issued an alert about malware being spread via the country's postal service.…