Topic Replies Activity
Malice or Incompetence: On the Rankings of Apple’s Own Apps in App Store Results 1 September 13, 2019
ISC Stormcast For Friday, September 13th 2019 https://isc.sans.edu/podcastdetail.html?id=6664, (Fri, Sep 13th) 1 September 13, 2019
‘It’s Over. It’s Over for Apple.’ 1 September 13, 2019
NZ to fund NZ$10m to support Pacific cybersecurity strategy 1 September 13, 2019
The Vast Social Media Landscape for Phishing Threats 1 September 13, 2019
Sophos open-sources Sandboxie, an utility for sandboxing any application 1 September 12, 2019
Microsoft Authenticator on Android gets cloud backup and recovery 1 September 12, 2019
The data protection market is reforming: Hedvig is Commvault’s stake in the ground 1 September 12, 2019
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt 1 September 12, 2019
When to Use In-App Protection 1 September 12, 2019
SC Media Names Recorded Future Recommended Threat Intelligence Product 1 September 12, 2019
Threat Source newsletter (Sept. 12, 2019) 1 September 12, 2019
Researchers invent cryptocurrency wallet that eliminates ‘entire classes’ of vulnerabilities 1 September 12, 2019
Shape Security raises $51 million, hits $1 billion valuation 1 September 12, 2019
RIG Exploit Kit Chain Internals 1 September 12, 2019
How a Secret Dutch Mole Aided the Stuxnet Cyberattack on Iran 1 September 12, 2019
Are students prepared for real-world cyber curveballs? 1 September 12, 2019
California mulls over ban of facial recognition tech in police body cameras 1 September 12, 2019
New Simjacker attack exploited in the wild to track users for at least two years 1 September 12, 2019
Hey Google: What we search for most in cybersecurity .. cyber security? 1 September 12, 2019
Patch Management a Key Area for Improvement at Most SMBs, Study Shows 1 September 12, 2019
How not to do it: object lessons in discovery and data protection from Her Majesty’s Government 1 September 12, 2019
[SANS ISC] Blocking Firefox DoH with Bind 1 September 12, 2019
From BinDiff to Zero-Day: A Proof of Concept Exploiting CVE-2019-1208 in Internet Explorer 1 September 12, 2019
The tangle of WiryJMPer’s obfuscation 1 September 12, 2019
What Is Cortex Data Lake? 1 September 12, 2019
Ransomware attacks: Weak passwords are now your biggest risk 1 September 12, 2019
State of The Internet / Security: Media Under Attack, Special Edition 1 September 12, 2019
Simjacker: a brand new mobile vulnerability exploited by surveillance companies for espionage operation 1 September 12, 2019
Most consumers will refuse to work with enterprises that won’t keep their data secure 1 September 12, 2019