When companies merge, so do their cyber threats
16
Apr
2025

When companies merge, so do their cyber threats

For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open…

MITRE's CVE Database
16
Apr
2025

U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert

Apr 16, 2025Ravie LakshmananVulnerability Management / Incident Response The U.S. government funding for non-profit research giant MITRE to operate and…

Is it becoming cool to not capitalize story titles?
16
Apr
2025

Is it becoming cool to not capitalize story titles?

While reading certain publications recently I’ve been paying a bit more attention to the typography and capitalization. The main thing…

Using Threat Intelligence To Combat Advanced Persistent Threats (APTs)
16
Apr
2025

Using Threat Intelligence To Combat Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) represent some of the most sophisticated cyber threats organizations face today. Unlike conventional attacks, APTs involve…

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility
16
Apr
2025

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring platform. As organizations face increasingly…

Browser extensions make nearly every employee a potential attack vector
16
Apr
2025

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according…

Just Implemented Memcached | Daniel Miessler
16
Apr
2025

Just Implemented Memcached | Daniel Miessler

So I just implemented memcached. It’s basically a system that uses hash tables to serve content directly from memory rather…

Jane Devry
16
Apr
2025

Crafty Threat Actors Unleash Ingenious Phishing Ploys

Ever feel like phishing scams are on a never-ending quest for supreme deception? From fake delivery notifications to impersonated CEOs,…

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
16
Apr
2025

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and…

Percentages of Hitting a Given Number Using x Number of d6’s
16
Apr
2025

Percentages of Hitting a Given Number Using x Number of d6’s

My buddies and I are doing a Harn campaign right now and one of the mechanics involves accruing stat “checks”…

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security
16
Apr
2025

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware…

The future of authentication: Why passwordless is the way forward
16
Apr
2025

The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to…