Jeff KaisermaninSlalom BusinessResiliency is more than just technologyLessons from the Change Healthcare ransomware attackMay 312
Ervin ZubicinOSINT AmbitionTransforming Dark Web Data into Cybersecurity IntelligenceHow can raw dark web data be turned into actionable cybersecurity plans? Learn essential monitoring locations, the path from data to…May 22May 22
Paul DughiinStronger Content10 Billion Passwords Leaked: Should You WorryIn a recent cybersecurity incident, an unprecedented leak of nearly 10 billion unique plaintext passwords has surfaced on a widely-used…15h ago15h ago
Sai Krishna KothapalliHow the Personal Data of India’s Richest Could Have Been Leaked!The story of how Ratan Tata, Mukesh Ambani, Gautam Adani, Virat Kohli, Shah Rukh Khan and lakhs of other rich and influential people’s…Jan 172Jan 172
Jeff KaisermaninSlalom BusinessResiliency is more than just technologyLessons from the Change Healthcare ransomware attackMay 312
Ervin ZubicinOSINT AmbitionTransforming Dark Web Data into Cybersecurity IntelligenceHow can raw dark web data be turned into actionable cybersecurity plans? Learn essential monitoring locations, the path from data to…May 22
Paul DughiinStronger Content10 Billion Passwords Leaked: Should You WorryIn a recent cybersecurity incident, an unprecedented leak of nearly 10 billion unique plaintext passwords has surfaced on a widely-used…15h ago
Sai Krishna KothapalliHow the Personal Data of India’s Richest Could Have Been Leaked!The story of how Ratan Tata, Mukesh Ambani, Gautam Adani, Virat Kohli, Shah Rukh Khan and lakhs of other rich and influential people’s…Jan 172
JanhviThe RockYou2024 Password Compilation: A New Era of Credential Stuffing AttacksCredentials stuffing attacks remain one of the most common and successful methods of gaining initial access to services and systems for…4d ago
Ryan Williams Sr.OpenAI’s Internal Data Breach ExposedWelcome back to “The Other Side of the Firewall” podcast, where we discuss the latest cybersecurity news and highlight influential figures…1d ago
PCMaginPC MagazineWhat Really Happens In a Data Breach (and What You Can Do About It)We explain what a data breach means for you — and how to protect yourself against damage to your privacy.Jul 26, 20236