Customer data is safe, police and Redmond confirm
Cyber Essentials ‘Breach’ Exposes Firms to Phishers
Config error at Pervade Software led to disclosure of participating organizations
From Shodan to Remote Code Execution #1 – hacking Jenkins
In this era of extreme automation, whether for development, programming deployment or even security management are we getting closer to security maturity or are we better off without the automation? In the next posts, I hope to uncover some of the tool…
Honda Forced to Shut Plant After WannaCry Returns
Carmaker tried to secure systems in mid-May
UK Uni Ransomware Attacks Linked to Malvertising Campaign
AdGholas banking Trojan group to blame, says Proofpoint
Median Dwell Time for Hackers Drops to 49 Days
Yet Trustwave report shows firms aren’t containing threats much quicker
How to Build Virtual Python Environment
In the DevOps world, getting a consistent development environment is crucial. In this post, I’ll show you how to set up a virtual Python environment and install the correct libraries to achieve a consistent development environment.
Steganography Sees a Rise in 2017
McAfee has observed an increase in the use of images and videos to pass malicious information without detection.
Girl Scouts to Offer Cybersecurity Badges
GSUSA is partnering with Palo Alto on 18 new badges to be made available to girls in grades K-12 (ages 5 to 18).