Config error at Pervade Software led to disclosure of participating organizations
From Shodan to Remote Code Execution #1 – hacking Jenkins
In this era of extreme automation, whether for development, programming deployment or even security management are we getting closer to security maturity or are we better off without the automation? In the next posts, I hope to uncover some of the tool…
Honda Forced to Shut Plant After WannaCry Returns
Carmaker tried to secure systems in mid-May
UK Uni Ransomware Attacks Linked to Malvertising Campaign
AdGholas banking Trojan group to blame, says Proofpoint
Median Dwell Time for Hackers Drops to 49 Days
Yet Trustwave report shows firms aren’t containing threats much quicker
How to Build Virtual Python Environment
In the DevOps world, getting a consistent development environment is crucial. In this post, I’ll show you how to set up a virtual Python environment and install the correct libraries to achieve a consistent development environment.
Steganography Sees a Rise in 2017
McAfee has observed an increase in the use of images and videos to pass malicious information without detection.
Girl Scouts to Offer Cybersecurity Badges
GSUSA is partnering with Palo Alto on 18 new badges to be made available to girls in grades K-12 (ages 5 to 18).
Mexican Government Accused of Targeting Journos with Spyware
Citizen Lab report uncovers widespread campaign during 2015-16