End of an Era: It’s Time to Stop Making Fun of Microsoft Security
A lingering feeling that I’ve had for roughly the last year was solidified for me last week at Blackhat/DEFCON. Making fun of Microsoft’s security program…
A lingering feeling that I’ve had for roughly the last year was solidified for me last week at Blackhat/DEFCON. Making fun of Microsoft’s security program…
Facebook has officially launched ThreatExchange – a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.…
A significant denial-of-service vulnerability (CVE-2025-0128) is affecting multiple versions of their PAN-OS firewall software. The flaw allows unauthenticated attackers to remotely trigger system reboots using…
Ever wanted to take a piece of WordPress functionality and put it in a non-WordPress portion of your website? Like, for example, pulling your WordPress…
With Valentine’s Day nearly upon us, millions will be looking for love online. Here’s six online dating scams to look out for. 12 Feb 2015…
A new wave of phishing emails is sweeping across Latin America, and once again, Grandoreiro is behind it. This banking trojan is no newcomer; it’s…
For years, global cybersecurity alerts have been issued to safeguard a variety of devices—ranging from personal computers and smartphones to servers and Internet of Things…
From a psychological standpoint, we all crave attention, and likes and comments fuel that need, encouraging us to share even more on social media. In…
7-Eleven Australia’s general manager of strategy and technology, Stephen Eyears, has left the organisation, coinciding with a change to its “support office structure”. Stephen Eyears…
I was getting into the elevator today, running back and forth between managing a long-term vendor project and keeping things under control with my other…
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context. 13 Feb 2015 • ,…
Packed with real-world scenarios, hands-on techniques, and insights into widely used tools, the third edition of the bestselling Ultimate Kali Linux Book offers a practical…