Top 5 Benefits of Cloud Infrastructure Security 

How is Cloud Infrastructure Security Important for an Organization? Embracing new technologies lead to qualitative growth but simultaneously holds high chances of quantitative data breaches. While adopting cloud technology, it is important to see the s… Continue reading Top 5 Benefits of Cloud Infrastructure Security 

Why Run Backwards with Risk, Security, and Compliance?

The Olympic Games are finally here! As you watch the track and field events, just imagine your surprise if one of the runners lined up facing the wrong way and ran backwards around the track. This would seem foolish or impossible, yet in many org… Continue reading Why Run Backwards with Risk, Security, and Compliance?

How Network Segmentation Can Protect Supply Chains from Ransomware Attacks

Organizations can take various steps to protect their operational technology (OT) environments against digital threats. But some stand out more than others. In particular, network segmentation is described as “the first answer to insufficient ICS (Indu… Continue reading How Network Segmentation Can Protect Supply Chains from Ransomware Attacks

Ghidra 101: Loading Windows Symbols (PDB files) in Ghidra 10.x

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an… Continue reading Ghidra 101: Loading Windows Symbols (PDB files) in Ghidra 10.x

Cybersecurity Insurers Are Putting an End to the ‘Pass the Buck’ Era

Though plenty of analysts foresaw that 2021 might be a dramatic year when it came to corporate cyberattacks, I think it’s fair to say that even by now it has surpassed our expectations. First there was the SolarWinds breach and now a massive attack has… Continue reading Cybersecurity Insurers Are Putting an End to the ‘Pass the Buck’ Era

Shadow IT, Cloud-Based Malware Increase AppSec Risks

Cloud application security risks continue to rise as malware delivered by cloud applications continues to grow, according to a study by Netskope. The biannual study also highlighted the potential for critical data exfiltration tied to employees depart… Continue reading Shadow IT, Cloud-Based Malware Increase AppSec Risks

Judge Orders Capitol Rioter to Unlock Laptop

Guy Reffitt traveled from his home in Wylie, Texas, to Washington, D.C., with an AR-15 rifle and a Smith & Wesson .40 caliber handgun, to participate in the riot and obstruction of Congress that occurred at the U.S. Capitol on January 6, 2021. He … Continue reading Judge Orders Capitol Rioter to Unlock Laptop

For Hackers, APIs are Low-Hanging Fruit

By 2022, API abuses will become the most frequent attack vector, predicts Gartner. We’re already witnessing new API exploits reach the headlines on a near-daily basis. Most infamous was the Equifax breach, an attack that exposed 147 million accounts i… Continue reading For Hackers, APIs are Low-Hanging Fruit

Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

Pegasus spyware and NSO Group are back in the news because of a data leak of 50,000 phone numbers, another “hacker” was arrested for the great Twitter hack of 2020, and how a 16 year old printer vulnerability is affecting millions of HP, Samsung, and X… Continue reading Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

Acoustic: Solving a CyberDefenders PCAP SIP/RTP Challenge with R, Zeek, tshark (& friends)

Hot on the heels of the previous CyberDefenders Challenge Solution comes this noisy installment which solves their Acoustic challenge. You can find the source Rmd on GitHub, but I’m also testing the limits of WP’s markdown rendering and putting it in-s… Continue reading Acoustic: Solving a CyberDefenders PCAP SIP/RTP Challenge with R, Zeek, tshark (& friends)