21
Apr
2023

Armorblox releases Graymail and Recon Attack Protection to stop malicious emails

Armorblox has released its newest product, Graymail and Recon Attack Protection, developed to decrease the time security teams spend managing…

snout of a growling bear
21
Apr
2023

Fancy Bear known to be exploiting vulnerability in Cisco routers

A joint advisory about a Cisco vulnerability by several US and UK agencies gives us a peek inside the minds…

An automatic interactive pre-commit checklist, in the style of infomercials
21
Apr
2023

An automatic interactive pre-commit checklist, in the style of infomercials

How to set up an interactive checklist using a Git pre-commit hook script. What’s that, you say? You’ve become tired…

FTC tackles tech support scams by chasing payment processor firms
21
Apr
2023

FTC tackles tech support scams by chasing payment processor firms

We take a look at a story involving the FTC going head to head with a payment processor caught up…

3CX Breach Was a Double Supply Chain Compromise – Krebs on Security
21
Apr
2023

3CX Breach Was a Double Supply Chain Compromise – Krebs on Security

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX. The lengthy,…

QBot changes tactic, remains a menace to business networks
21
Apr
2023

QBot changes tactic, remains a menace to business networks

QBot has resurfaced with a new tactic involving a reply-chain phishing email, a fake PDF, and the likely promise of…

H1-702 Las Vegas Day 0: Setup
21
Apr
2023

H1-702 Las Vegas Day 0: Setup

Hackers! We have made it to Las Vegas! We are here for a live hacking event (LHE). All live hacking…

Hacking Cisco Industrial Network Director (IND) router using vulnerabilities with CVSS score 9.9
21
Apr
2023

Hacking Cisco Industrial Network Director (IND) router using vulnerabilities with CVSS score 9.9

Cisco Industrial Network Director (IND) is an important tool for managing industrial networks, particularly in settings that need high-security standards….

G2 comparison of top Endpoint Security vendors
21
Apr
2023

G2 comparison of top Endpoint Security vendors

#1 in Endpoint Protection, #1 ROI for EDR, #1 for EDR implementation. Navigating the world of endpoint security is challenging,…

Attack surface monitoring vs vulnerability scanning
21
Apr
2023

What’s the difference between Attack Surface Monitoring and Vulnerability Scanning?

Detectify is driving the future of internet security with automation and crowdsourcing hacker research. It’s focused on helping companies detect…

NO. 362 | Dependency Scanner, Citrix Attacks, AI Analysis…
20
Apr
2023

NO. 362 | Dependency Scanner, Citrix Attacks, AI Analysis…

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 362 |…

20
Apr
2023

On doing great things | victoria.dev

Some thoughts inspired by International Women’s Day, Grace Hopper, and making contributions to the world of tech. It’s International Women’s…