How defenders can reach outside their organizations to leverage pooled resources
#RSAC: The Impact of Industrial IoT Exploits
Ed Cabrera examines the attack surface of smart factories and industrial robots
48 Million Detailed Psychometric Records on Individuals Leaked
The data consists of Cambridge Analytica-style profile information from tens of millions of people, scraped from multiple sources.
70% of Energy IT Pros Fear ‘Catastrophic Failure’ from Cyber-Attacks
97% are concerned that attacks could cause operational shutdowns, and 96% believe they could impact the safety of their employees.
IT Managers Lack Visibility into Almost Half of Network Traffic
Nearly a quarter of IT managers are blind to as much as 70% of their network traffic.
UK ID Fraud Hits an All-Time High
Cifas reveals scammers now targeting online retail, telecoms and insurance
MPs Demand Faster NHS Response on Cyber, One Year After WannaCry
Public Accounts Committee “alarmed” at current failings
Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup
A couple years ago we did a tutorial on Hacking Tutorials on how to install the popular vulnerability assessment tool OpenVAS on Kali Linux. We’ve covered the installation process on Kali Linux and running a basic scan on the Metasploitable 2 vir…
TaskRabbit Takes Site Offline After Security Incident
IKEA-owned marketplace tells users to change passwords
#RSAC: It’s Time to Kill the Pen Test
Adrian Sanabria on why he believes it’s time to kill the network pen test