Folks,
Hope you’re all well. Last year I had said that it was time for us to provide Thought Leadership to the Cyber Security space.
Since then, I’ve penned over 50 blog posts, on numerous important topics,
and helped 1000s of organizations worldw…
More results...
Folks,
Hope you’re all well. Last year I had said that it was time for us to provide Thought Leadership to the Cyber Security space.
Since then, I’ve penned over 50 blog posts, on numerous important topics,
and helped 1000s of organizations worldw…
There are four distinct groups of cyber-criminals: traditional gangs, state-sponsored attackers, ideological hackers and hackers-for-hire
Key services disrupted for over a million residents
An espionage campaign being carried out in the Middle East uses a vulnerability less than a week after Microsoft patched it.
The plan addresses a hot-button topic in the wake of Russian meddling in the US presidential election last year.
The compromise was highly professional and involved “sophisticated social engineering”—leading to the loss of 4,700 bitcoins.
The compromise was highly professional and involved “sophisticated social engineering”—leading to the loss of 4,700 bitcoins.
Nikizungumza
na kundi maalum katika vikao vinavyoendelea nimewasilisha ujumbe wa Tahadhari
ambapo Uma umetahadharishwa juu ya mashambulizi takriban Milioni hamsini (50 Milioni) duniani kote katika kipindi cha sikukuu yatakayo
gharimu kati ya Dola 5…
Attackers and spies are merging to use tools to extort companies, using espionage and cybercrime tools.
UK regulator urges more openness for the good of the industry