Week 51 in Review: Zoom's VISS and a Surge in Zero-Days
A lot of writing this past week, but most of which won’t be published for the next few weeks, since my editors are caching articles for the coming...
A lot of writing this past week, but most of which won’t be published for the next few weeks, since my editors are caching articles for the coming...
I had two articles published this week, one over at Dark Reading covering the relative improvement in LinkedIn scams targeting the Middle East and another for Synack’s README.security...
I had four articles published this week. The top story was based on analyses from Palo Alto Networks and Microsoft that showed that the Russian hacking group known...
Only two articles out this week. As part of Dark Reading’s increased focus on the Middle East and Africa, I covered the surge in ransomware and other threats...
Happy Thanksgiving to those who celebrate it. This week, Dark Reading published three articles, including coverage of the strengths and weaknesses of the the Known Exploited Vulnerabilities (KEV)...
This week I covered the Molerats group’s adoption of a more advanced payload for its espionage campaign, more than dozen vulnerabilities found in an handful of popular AI...
My articles this weeks spanned the seemingly old (mainframes), the seemingly new (vulnerability-fixing AIs), and the never-ending effort to stop bad guys, this time with a focus on...
A couple of weekends ago, I moved over my domain and mail infrastructure to new providers, so I decided to use the momentum to get my blog back...
I mainly focused on the economy in my published reports this week. Both articles are for Dark Reading.
A breach of at least one developer on the Steam game platform led Valve, the owner of Steam, to required a cell number for every developer for 2-factor...
Open-source software is the critical technology that has allowed cloud services to take off. Why has a similar effect not happened in the security world. The open-source infrastructure...
As a network-penetration expert, Wesley McGrew regularly runs red-team exercises against the networks of his clients, and increasingly he is seeing containerized applications being targeted.
When Charles Givre, lead data scientist at Deutsche Bank, teaches security teams about the benefits of applying security data science techniques, he often focuses on a common malware...
Secureworks can’t hire cybersecurity pros fast enough.
Here are some techniques that I handled.
This year has been an exciting one so far. I’ve tackled a number of data-analysis projects, including investigating data on the cybersecurity workforce shortfall and a deep dive...
Major news organizations stated that cybercriminals had raked in more than $209 million from ransomware victims in the first quarter of 2016, more than an eight-fold increase compared...
Digging into a data point that has minimal citation finds it is more three years older than expected and came from a completely different source.
February 2017 marked a major anniversary for me: Two straight decades as a journalist and writer.
It’s amazing how quickly a month can pass and how easily a commitment to regularly update your blog goes by the wayside. The past month, I’ve written more...
Phishing is one of those problems that the security industry is not going to solve. However, they are making it tougher.
Ransomware is a significant threat companies and consumers. No surprise, then, that U.S. lawmakers are calling hearings on the increasing number of attacks. I hadn’t heard about
I’m a planner. While often a good thing — planning out a large report can make the resultant work much easier — when it comes to embarking on...