Why Your Castle Isn’t Enough: Security Must Look Beyond the Perimeter
The traditional “castle-and-moat” model of cybersecurity is outdated. Firewalls, endpoint protection and segmentation are all still important. But if you...
Read more →The traditional “castle-and-moat” model of cybersecurity is outdated. Firewalls, endpoint protection and segmentation are all still important. But if you...
Read more →Cybersecurity Ventures recently asked AI “Why use YouTube for marketing?” and it replied “YouTube is a powerful marketing tool because...
Read more →A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. “Attackers increasingly...
Read more →I think there are two primary levels of awareness possible for modern humans. There are those who don’t think about...
Read more →Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution...
Read more →Passive DNS has emerged as a critical tool for cybersecurity professionals seeking to identify and track malicious command and control...
Read more →In the cybersecurity industry, we’ve become obsessed with complexity. Every conference showcase features dazzling new AI-infused solutions, quantum-resistant algorithms, and...
Read more →CVE-2021-20035, an old vulnerability affecting Sonicwall Secure Mobile Access (SMA) 100 series appliances, is being exploited by attackers. Sonicwall confirmed...
Read more →U.S. CISA adds Apple products and Microsoft Windows NTLM flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 18,...
Read more →I recently decided to give Xobni for GMail a try. It does some wicked integration between your Google contacts, Facebook,...
Read more →Entertainment venue management firm Legends International disclosed a data breach Pierluigi Paganini April 18, 2025 Legends International disclosed a data...
Read more →I am often asked how I handle handle security while using social networks. This post serves as my answer in...
Read more →