CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape
Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel…
Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel…
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or…
Russia is proposing a rule that all foreigners in Moscow install a tracking app on their phones. Using a mobile…
Imagine this scenario: You’re winding down for the evening, having checked the locks and closed the windows, feeling secure enough…
One one my biggest worries about VPNs is the amount of trust users need to place in them, and how…
Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite…
Interesting story: USS Stein was underway when her anti-submarine sonar gear suddenly stopped working. On returning to port and putting…
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major…
This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that…
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation