Using Threat Intelligence To Combat Advanced Persistent Threats (APTs)
16
Apr
2025

Using Threat Intelligence To Combat Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) represent some of the most sophisticated cyber threats organizations face today. Unlike conventional attacks, APTs involve…

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility
16
Apr
2025

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring platform. As organizations face increasingly…

Browser extensions make nearly every employee a potential attack vector
16
Apr
2025

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according…

Just Implemented Memcached | Daniel Miessler
16
Apr
2025

Just Implemented Memcached | Daniel Miessler

So I just implemented memcached. It’s basically a system that uses hash tables to serve content directly from memory rather…

Jane Devry
16
Apr
2025

Crafty Threat Actors Unleash Ingenious Phishing Ploys

Ever feel like phishing scams are on a never-ending quest for supreme deception? From fake delivery notifications to impersonated CEOs,…

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
16
Apr
2025

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and…

Percentages of Hitting a Given Number Using x Number of d6’s
16
Apr
2025

Percentages of Hitting a Given Number Using x Number of d6’s

My buddies and I are doing a Harn campaign right now and one of the mechanics involves accruing stat “checks”…

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security
16
Apr
2025

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware…

The future of authentication: Why passwordless is the way forward
16
Apr
2025

The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to…

Modern Science on Self-Control, and 4 Things You Can Do Immediately to Improve It
16
Apr
2025

Modern Science on Self-Control, and 4 Things You Can Do Immediately to Improve It

Image from scientificamerican.com Scientists are now discovering that self-control is a precious, finite resource that can be raised and lowered…

PayPal and Two-Factor Authentication: A “Weakest Link” Case in Point
16
Apr
2025

PayPal and Two-Factor Authentication: A “Weakest Link” Case in Point

I am an enthusiastic user of the Verisign PIP two-factor authentication service. It’s a system that allows you to add additional…

Why We Shouldn’t Call Ourselves Atheists
16
Apr
2025

Why We Shouldn’t Call Ourselves Atheists

First, watch the talk. Believe me–it’s worth it. Now, I think the talk is brilliant, and I think he makes…