What paths can leaders take to successfully manage challenging conversations?
#GartnerSEC: Maersk CISO Outlines Lessons Learned From NotPetya Attack
What companies need to learn about a malware attack such as NotPetya
#GartnerSEC: Maersk CISO Outlines Lessons Learned From NotPetya Attack
What companies need to learn about a malware attack such as NotPetya
#GartnerSEC: Maersk’s Adam Banks Reflects on NotPetya Response and Recovery
How the shipping giant reacted to the devastating NotPetya malware attack
More Than 99% of Threats Target Corporate Staff
Proofpoint urges organizations to improve human-centric security
#GartnerSEC: 2019 Projects Should Include Incident Response, BEC and Container Security
The top ten security projects for 2019 now include container security and BEC
Mozilla to Roll-Out DNS-Over-HTTPS For Safer Browsing
Default setting could improve privacy and security protections
Toyota Subsidiary Suffers $37m BEC Loss
Car parts maker was tricked into wiring four billion yen
PostShell – Post Exploitation Bind/Backconnect Shell
PostShell – Post Exploitation Bind/Backconnect Shell
PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control.
The stub size is around 14kb and ca…
Lufthansa Offers Biometric Boarding at Fourth US Airport
Biometric boarding is now available to Lufthansa’s JFK passengers