Understanding and Improving the Burden on Threat Hunters
Despite increased security budgets, threat hunters say they are under-resourced and overstretched
read more
Continue reading Understanding and Improving the Burden on Threat Hunters
Collaborate Disseminate
Despite increased security budgets, threat hunters say they are under-resourced and overstretched
read more
Continue reading Understanding and Improving the Burden on Threat Hunters
On May 12, 2021, President Biden signed an Executive Order (EO) on Improving the Nation’s Cybersecurity. It is a detailed overview of the Federal government’s plan to better secure America – and it calls out zero-trust as a major pillar of that process… Continue reading A Deeper Dive Into Zero-Trust and Biden’s Cybersecurity Executive Order
“To some extent, this data supports the theory that the cybersecurity skills shortage is related to mismanagement rather than a dearth of qualified candidates or advanced skills.”
read more
Continue reading Mismanagement Driving Cybersecurity Skills Gap: Research
Researchers have discovered three separate Chinese military affiliated advanced threat groups simultaneously targeting and compromising the same Southeast Asian telcos. The attack groups concerned are Soft Cell, Naikon, and a third group, possibly Emis… Continue reading DeadRinger: A Three-Pronged Attack by Chinese Military Actors against Major Telcos
Nobelium-style Phishing Tactics Used to Spread Malware
read more
Continue reading Chipotle’s Email Marketing Account Hacked to Spread Malware
For the last 15 years, researchers have produced an annual State of Application Security report. But in the last 18 pandemic driven months, they told SecurityWeek, “the world has turned on its head.” Both application development and use, and subsequent… Continue reading Window of Exposure is Expanding and Hackers Know Exactly Where to Strike
Hacking tool downloads from underground forums are increasing, and the tools are becoming more sophisticated; low-level hackers are gaining access to hacked versions of sophisticated tools; access broking is growing; and existing tools are repurposed f… Continue reading How Low-level Hackers Access High-end Malware
SolCyber has emerged from stealth with $20 million in Series A funding from ForgePoint Capital, claiming to be the first modern MSSP for the mid-market. Venture funding for an MSSP is not unknown, but not common. It indicates that VC has confidence tha… Continue reading MSSP SolCyber Emerges From Stealth With $20 Million Series A Funding
Using ‘policy as code’ helps the security team to be a cloud highway builder rather than a cloud toll booth operator
read more
Continue reading Survey Shows Reasons for Cloud Misconfigurations are Many and Complex