Welcome back to the Holiday Readiness blog series. We hope part one has kept you busy over the past month as you continue to improve your security posture. If you haven?t finished all of the security checklist items, don?t worry ? there is still time b…
Passwords ? Extinction Event Looming?
Passwords are the bane of users and security teams? lives. Despite years of security teams educating users about not using 123456 as a password, not recycling passwords across multiple personal and professional accounts, and implementing even more rigo…
UPX Packed Headaches
Researching malware has many challenges. One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we’ve written a small tool in C that could fix intentionally corrupted binaries automatically. W…
Dogged Persistence?The Name of the Game for One DDoS Attacker
With DDoS, we typically observe a moderate degree of attacker persistence. DDoS attacks are relatively easy to launch from a number of online booter services, and the availability of cryptocurrencies for payment has made it easy to remain anonymous. At…
The Top 10 Safest Colleges in Texas
College-Bound Freshmen: See Which Colleges are the Safest in Your State in 2020 Living in Texas certainly has its perks. Between year-round warm weather, a low cost of living, tons of post-college job opportunities, and TexMex everywhere, there a…
Tokyo Streaming Traffic Runs Rings Around Rio
With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along w…
Defensive Security Podcast Episode 258
https://arstechnica.com/gadgets/2021/07/malicious-pypi-packages-caught-stealing-developer-data-and-injecting-code/
https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/
https://www.securityweek….
How Businesses Can Utilise Penetration Testing
Understand your security vulnerabilitiesArticle by Beau PetersThe basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among them, have been getting incr…
The Philippine Navy’s new Corvette Acquisition Project moves closer to reality, as more details are revealed
The Philippine Navy (PN) has been pursuing the acquisition of new guided-missile Corvettes as it continues to improve its combat capability as part of the service’s modernization program.Two new corvettes are eyed under the Corvette Acquisition P…
The tricks some bars and restaurants in Spain use to overcharge you (and how to avoid them)
Spain is a relatively well-priced country to enjoy a meal out, but there are numerous sneaky tricks some establishments use to squeeze extra money out of customers, sometimes illegally.