I’m Open Sourcing the Have I Been Pwned Code Base

Presently sponsored by: Tines: Breaches are inevitable and early detection is crucial. Assure yourself what’s next with security automation part 1.

Let me just cut straight to it: I’m going to open source the Have I Been Pwned code base. The decision has been a while coming and it took a failed M&A process to get here, but the code will be turned over to the public for the

Continue reading I’m Open Sourcing the Have I Been Pwned Code Base

3 Tips to Safeguard Your Digital Future

The ongoing COVID-19 crisis has proven that applications are the driving force of the world economy. With a massive shift from brick-and-mortar locations to online operations across all industries during lockdowns, companies will likely continue to en… Continue reading 3 Tips to Safeguard Your Digital Future

Exorcist Ransomware and CIS Exclusion

This year has been a bumper year for ransomware and its operators. Ransomware gangs are demanding millions; if those millions are not paid in time, then data stolen before encryption is either released to the public or sold to the highest bidder. Big … Continue reading Exorcist Ransomware and CIS Exclusion

August 2020 Patch Tuesday forecast: Planning for the end?

There doesn’t seem to be an end in sight to the COVID-19 crisis, but there are some important end-of-life/end-of-support dates we should be aware of when it comes to software. Before we dig into this month’s forecast of updates, I want to spend a littl… Continue reading August 2020 Patch Tuesday forecast: Planning for the end?

The Google Chrome Dinosaur Game, in Real Life

[Ryan] wanted to hack the Google Chrome Dinosaur Game so he could control the dinosaur with his own movements. The game only requires two keyboard presses (up and down arrow keys), so controlling the game with the Arduino Keyboard library only requires a few simple function calls.

He uses the …read more

Continue reading The Google Chrome Dinosaur Game, in Real Life

New infosec products of the week: August 7, 2020

Radiflow launches CIARA, a ROI-driven risk assessment and management platform for industrial organizations CIARA is a fully automated tool for assets data collection, data-driven analysis and transparent risk metrics calculation including risk scoring … Continue reading New infosec products of the week: August 7, 2020

Open source tool Infection Monkey allows security pros to test their network like never before

Guardicore unveiled new capabilities for Infection Monkey, its free, open source breach and attack simulation (BAS) tool that maps to the MITRE ATT&CK knowledge base and tests network adherence to the Forrester Zero Trust framework. Infection Monk… Continue reading Open source tool Infection Monkey allows security pros to test their network like never before