threat models
Seceon to Participate In AGC Partners’ 2017 Boston Technology Growth Conference
Seceon will again be participating with AGC Partners in its 14th Annual Boston Technology Growth Conference to be held on Thursday, November 9th. The AGC Partner Conference is a premier showcase for fast ...
Seceon to Participate In AGC Partners’ 2017 Boston Technology Growth Conference
Seceon will again be participating with AGC Partners in its 14th Annual Boston Technology Growth Conference to be held on Thursday, November 9th. The AGC Partner Conference is a premier showcase for fast ...
Security Analysis of Threema
A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...
Threats of Machine-Generated Text
With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field: what the threats are, how ...
New Sophisticated Malware
Mandiant is reporting on a new botnet. The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims’ networks with unusual stealth. In cases where ...
Bunnie Huang’s Plausibly Deniable Database
Bunnie Huang has created a Plausibly Deniable Database. Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size ...
Best Intelligent SIEM Vendor
Best Intelligent SIEM Vendor - Seceon SIEM tools help you simplify compliance reporting, with better access and visibility into networks, and high scalability. Nowadays, cyber-attacks are common than one can comprehend. With ...
How Seceon could have stopped the Ransomware roll over Kaseya.
The post How Seceon could have stopped the Ransomware roll over Kaseya. appeared first on Seceon ...