hacker
Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
How to Break Into a Cybersecurity Career – Phillip Wylie
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique ...
The Legacy of The Hacker Manifesto
I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
Smart Phone, Smart Watch, Smart Pay, Smart?
Smart Phone, Smart Watch, Smart Pay, Smart?How safe is smart?The idea of never needing to carry cash or debit cards looks pretty appealing, right? Never worry about someone trying to steal your ...
What is in Your SOC?
What is in Your SOC?Movie “300” credit — Warners Bros PicturesOffensive or defensive culture for SecOps- becoming purple?Organizations developing a Security operations center(SOC) should consider which strategy they should adopt based on ...
The Power of Provenance: From Reactive to Proactive Cybersecurity
While next-gen firewalls (NGFW), extended detection and response (XDR) and other security solutions do a great job of detecting and thwarting cyberattacks, it’s just too common for a sneaky or camouflaged threat ...
Geopolitical Cyber Attacks — The New Battlefield
Geopolitical Cyber Attacks — The New BattlefieldModern Data Communications in VietnamThe new battlefield on display in the conflict between Russia and Ukraine war shows a progression of cybersecurity tactics revolutionizing the overall ...
Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet
Researchers have discovered a new web tracking technique using your graphics card, scammers are exploiting security weaknesses on job recruitment websites to post fraudulent job postings, and how a hacker single-handedly took ...
British man arrested in connection with Twitter mega-hack that posted cryptocurrency scam from celebrity accounts
Police in Spain have arrested a British man in connection with what many consider the worst hack in Twitter’s history. In July 2020, the Twitter accounts of public figures and well-known organisations ...
Why do hackers use the same methods over again?”
Why do hackers use the same methods over again?”“Repeating oneself and expecting the different result” is the clear definition of insanity. Yet, hackers for 25 years have similar tactics like brute force, ...