CISA, White House urge organizations to get ready for holiday cyberattacks

The Cybersecurity and Infrastructure Security Agency and the White House have released warnings to companies and organizations across the country, urging them to be on alert for cyberattacks ahead of…

NPK: Free tool to crack password hashes with AWS

The NPK tool is an open-source password cracking tool developed by the Coalfire Labs Research and Development team. The initials NPK are inspired by the atomic elements contained within farm…

Regulator: Venues Must Protect User Privacy During #COVID19 Checks

Regulator: Venues Must Protect User Privacy During #COVID19 Checks The UK’s privacy watchdog has released new advice for venue owners and large event organizers on ensuring COVID-19 checks comply with…

Experts: All Breach Victims Should Freeze Credit

Experts: All Breach Victims Should Freeze Credit Only 3% of victims have frozen their credit after receiving a breach notice, despite it being the most effective way to prevent fraudsters…

In 2022, Expect More Supply Chain Pain and Changing Security Roles

If 2021 was the Year of Supply Chain Pain, 2022 will be the Year of Supply Chain Chronic Pain (or something worse than pain). This past year, the pain was…

What the Log4Shell Bug Means for SMBs: Experts Weigh In

An exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what’s vulnerable, what an attack looks like and to how to remediate. News of…

How to Buy Precious Patching Time as Log4j Exploits Fly

Podcast: Cybereason shares details about its vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show being disclosed. Sure, Apache got a patch…

“Worst-Case Scenario” Log4j Exploit Travels the Globe

“Worst-Case Scenario” Log4j Exploit Travels the Globe Security teams across the globe have been scrambling to address a dangerous new zero-day vulnerability in a popular Apache logging system currently being…

Fields of application of artificial intelligence

At present, it is difficult to find a field of work for people in which different mechanisms and machines are not used that facilitate human labor. Probably, soon the number…

Next-Gen Maldocs & How to Solve the Human Vulnerability

Malicious email attachments with macros are one of the most common ways hackers get in through the door. Huntress security researcher John Hammond discusses how threat hunters can fight back.…