The Infosec Trinity | Daniel Miessler
Well, I just passed the final exam for the GIAC GSEC credential from SANS, and I have to say it’s...
Read more →Well, I just passed the final exam for the GIAC GSEC credential from SANS, and I have to say it’s...
Read more →Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products...
Read more →A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio...
Read more →Something struck me the other day that I think most power-users with experience on both Windows and OS X would...
Read more →APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within...
Read more →There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however, seems to...
Read more →Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to...
Read more →In the competitive world where artificial intelligence (AI) has made it easy to use technology, companies are constantly looking for...
Read more →Originally from Mike Gancarz’s book, here are the 9 primary tenets of Unix. Small is Beautiful Make Each Program Do...
Read more →As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of...
Read more →Data protection is of the highest importance in 2025. With growing numbers of organizations handling sensitive customer data and stricter...
Read more →The frenzy to create Ghibli-style AI art using ChatGPT’s image-generation tool led to a record surge in users for OpenAI’s...
Read more →