Industroyer

Industroyer

Just over three-quarters of cybersecurity professionals have said they expect to see an increase in DNS-related security threats over the next few weeks.
In preparation, three in five (59%) have altered their DNS security methods in the run up to the holiday season, according to a new report from the Neustar International Security Council (NISC)

read more
New ‘dependency confusion’ attack technique recognized by Microsoft

New ‘dependency confusion’ attack technique recognized by Microsoft

Just over three-quarters of cybersecurity professionals have said they expect to see an increase in DNS-related security threats over the next few weeks.
In preparation, three in five (59%) have altered their DNS security methods in the run up to the holiday season, according to a new report from the Neustar International Security Council (NISC)

read more
CISOs Preparing for DNS Attacks Over Christmas

CISOs Preparing for DNS Attacks Over Christmas

Just over three-quarters of cybersecurity professionals have said they expect to see an increase in DNS-related security threats over the next few weeks.
In preparation, three in five (59%) have altered their DNS security methods in the run up to the holiday season, according to a new report from the Neustar International Security Council (NISC)

read more
Employees 85% more likely to leak files today vs pre-COVID

Employees 85% more likely to leak files today vs pre-COVID

Employees are 85 percent more likely today to leak files than they were before the COVID-19 pandemic, according to research released Thursday by Code42. Joe Payne, Code42’s president and CEO, said the vast majority of that 85 percent are malicious insiders and the rest are caused by employee carelessness.

read more
This Bluetooth Attack Can Steal a Tesla Model X in Minutes

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

Tesla has always prided itself on its so-called over-the-air updates, pushing out new code automatically to fix bugs and add features. But one security researcher has shown how vulnerabilities in the Tesla Model X’s keyless entry system allow a different sort of update: A hacker could rewrite the firmware of a key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes.

read more
Attacking SIEM with Fake Logs

Attacking SIEM with Fake Logs

Discussion around ATT&CK often involves tactics, techniques, procedures, detections, and mitigations, but a significant element is often overlooked: data sources. Data sources for every technique provide valuable context and opportunities to improve your security posture and impact your detection strategy.

read more

Pin It on Pinterest