Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends

Security is an aspect that every enterprise needs to consider as they use and migrate to cloud-based technologies. On top of the list of resources that enterprises need to secure are networks, endpoints, and applications. However, another critical asset that Read More …

Healthcare lags behind in critical vulnerability management, banks hold their ground

Vulnerability management is a key component of modern strategies to combat cyberattackers, but which industries perform well in this area? The general public faces phishing attempts, spam, malvertising, and more in their daily lives. However, in the business realm, successfully Read More …

Strategic investment to secure smart factories

Security is undergoing a digital transformation in the manufacturing industry. As the fusion of the cyber world and the physical world progresses, various security issues are mounting. Manufacturing executives must view security as a management issue, not as a system Read More …

Diving Into End-to-End Deep Learning for Cybersecurity

The application of artificial intelligence (AI) across various industries has undeniably made significant improvements in the digital era. With the capability to interpret and make complex decisions based on data, AI technologies have enabled tasks or processes to function with Read More …

Former Uber CSO charged for 2016 hack cover-up

Uber’s former chief security officer was charged on Thursday for covering up the company’s 2016 security breach, during which hackers stole the personal details of 57 million Uber customers and the details of 600,000 Uber drivers. Prosecutors in Northern California Read More …

Cyber experts urge Australia to develop local capability to defend against hackers

Cyber experts have urged the federal government to become less reliant on overseas businesses, technologies and expertise for its defences against hackers as it puts the finishing touches on the nation’s new cyber security strategy. Foreign providers are responsible for Read More …

Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool

Researchers at FireEye recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump for static analysis. Statically analyzing a large virtualized sample can take anywhere Read More …