California’s data protection law bares its teeth
Block Faces Class Action Suit After 2021 Breach
Plaintiffs argue firm’s security posture was ineffective
LastPass Hackers Stole Source Code
Password management firm reveals incident in early August
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Microsoft Attributes New Post-Compromise Capability to Nobelium
MagicWeb improves on FoggyWeb by facilitating covert access directly via a malicious DLL
Talos Renews Cybersecurity Support For Ukraine on Independence Day
Cisco and Talos both have resources available to organizations in Ukraine in need of assistance
CISA Releases Guidelines to Aid Companies Transition to Post-quantum Cryptography
The guide provides overview of potential impacts of quantum computing on National Critical Functions
Mitigating Log4j Abuse Using Akamai Guardicore Segmentation
Learn how Akamai Guardicore Segmentation can help you reveal vulnerable servers and applications, and stop exploitation.
What?s New for Developers: August 2022
This August?s developer update brings you some of the things we?ve been most excited to tell you about. We?re highlighting Terraform updates and more.
Why does the birthday person pay for everyone’s food and drinks in Spain?
One of the traditions that foreigners in Spain don’t get is why the birthday boy or girl is expected to pay for friends’ meals and drinks when they go out to celebrate. What’s the protocol for this habit?