The world is changing. At Akamai, we’re proud to be part of the shift towards a more inclusive future. Where digital systems may replace human processes, we are determined to keep people at the center of our focus. After all,…
Catch Me If You Can: Evasive and Defensive Techniques in Phishing
Phishing is a multifaceted type of attack, aimed at collecting usernames and passwords, personal information, or sometimes both. Yet, these attacks only work so long as the phishing kit itself remains hidden. Phishing is a numbers game and time is…
Radiohead Officially Releases Music Stolen in Hack
Rather than pay the $150K ransom, Radiohead has made the stolen tracks available to fans.
SOCs Struggle with Staffing, Reporting and Visibility
Alert overload and false positives remain a problem in the SOC.
HaveIBeenPwned.com Open to Acquisition
Maintaining the site at its level of growth has become overwhelming for Troy Hunt.
FTSE 250+ Demonstrate Weak Security, But Low SMB Exposure
FTSE 250+ organizations leave an average of 35 servers and devices exposed
Welsh Man Gets Four Years for TalkTalk Attack
Asperger’s syndrome sufferer sentenced to young offender institute
US Customs Contractor Hack Breaches Traveller Images
Data on tens of thousands is reportedly stolen
Chinese Uni Exposes 8TB+ of Email Metadata
Misconfigured Elasticsearch database again to blame
Criminals Try to Schedule Spam in Google Calendar
Spammers using Google services, including Calendar, Photos and Forms.