Ivan FedoretsCybersecurity: Cyberbreach vs Threat ModelingThe same, but different.. here are a few methods BRSE gives you to solve this..Dec 2
Erich SchmidtDiscord-Based Malware Brings New Surprises: Targeting Linux Systems in IndiaDid you hear the one about UTA0137, DirtyPipe, and a bunch of emojis walking into a server? Okay, maybe it’s not that kind of story. But it…Jun 14
Digitalworldvision.comHacking TransformedEvolving from a fringe activity, it now encompasses a diverse range of roles, methods, and ethical considerations. Here’s a closer look at…Nov 17Nov 17
Ivan FedoretsCybersecurity Needs Privacy? It does. A Grossly Overlooked Scenario!A surprising [for some] case when a cybersecurity function needs help from the privacy function.Jul 31Jul 31
Stephen WycoffUnderstanding the Dark Web and Its Impact on CybersecurityDemystifying the Dark Web: A Look at CybersecurityApr 252Apr 252
Ivan FedoretsCybersecurity: Cyberbreach vs Threat ModelingThe same, but different.. here are a few methods BRSE gives you to solve this..Dec 2
Erich SchmidtDiscord-Based Malware Brings New Surprises: Targeting Linux Systems in IndiaDid you hear the one about UTA0137, DirtyPipe, and a bunch of emojis walking into a server? Okay, maybe it’s not that kind of story. But it…Jun 14
Digitalworldvision.comHacking TransformedEvolving from a fringe activity, it now encompasses a diverse range of roles, methods, and ethical considerations. Here’s a closer look at…Nov 17
Ivan FedoretsCybersecurity Needs Privacy? It does. A Grossly Overlooked Scenario!A surprising [for some] case when a cybersecurity function needs help from the privacy function.Jul 31
Stephen WycoffUnderstanding the Dark Web and Its Impact on CybersecurityDemystifying the Dark Web: A Look at CybersecurityApr 252
Stephen WycoffTexas Tanked: A Cyber Wake-Up CallThis year, a small-town Texas water tank became the unlikely target in a major cyber attack. Hackers, believed to be part of the infamous…Apr 202
Stephen WycoffMalware: The Silent Thief Behind Most Data BreachesImagine a break-in where the thief didn’t smash a window, but instead used a spare key hidden under the doormat. That’s how malware…Mar 28
Stephen WycoffAmerican Express Suffers Major Data Breach Impacting Millions of CustomersAmerican Express, the multinational financial services corporation, has been hit with a major data breach that has compromised the personal…Mar 6