Over two-thirds of all scam texts were purportedly from delivery firms, according to new data
Half of US Hospitals Shut Down Networks Due to Ransomware
Skills gaps, inventory issues and funding shortfalls add to security headaches
“Jigsaw Puzzle” Phishing Attacks Use Morse Code to Hide
Microsoft reveals another dynamic email threat campaign
Europol: Islamic State Propaganda Networks Are Thriving
IS-supporting media outlets offering encryption advice to supporters
Tokyo Streaming Traffic Runs Rings Around Rio
With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along w…
Defensive Security Podcast Episode 258
https://arstechnica.com/gadgets/2021/07/malicious-pypi-packages-caught-stealing-developer-data-and-injecting-code/
https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/
https://www.securityweek….
Il Makiage Acquires Israeli AI Company
Computer vision technology firm Voyage81 acquired by American beauty company for $40M
US Agencies Ordered to Pinpoint Critical Software
White House memo gives federal agencies 60 days to identify critical software and one year to secure it
Dallas Loses 8TB of Criminal Case Data
Mayor calls for investigation after Dallas PD data lost during data migration
How Businesses Can Utilise Penetration Testing
Understand your security vulnerabilitiesArticle by Beau PetersThe basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among them, have been getting incr…