Cybersecurity
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
BSides Sofia 2023 – Alexandar Andonov – The Secure Software Supply Chain Function S3C
Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel. Permalink ...
BSides Sofia 2023 – Victor Bonev – Secure Distroless OCI Images Via YAML
Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel. Permalink ...
Review: Can We Trust the Waterfox Browser? (Updated 2023)
Waterfox came into the browser scene in 2011, coming right out the box with official x64 support (a rarity among browsers at the time) and promoted itself as an "ethical browser." However, ...
2023 OWASP Top-10 Series: Introduction
In early June 2023, OWASP released the final version of the OWASP API Security Top-10 list update. At that time we published a “hot take” on this final version and followed that ...
GitHub Developers Targeted by North Korea’s Lazarus Group
The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub ...
BSides Sofia 2023 – Georgi Gerganov – Keytap Acoustic Keyboard Eavesdropping
Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel. Permalink ...
What Is Federated Identity? How It Works & Why
What Is Federated Identity? Federated identity refers to linking a person’s electronic identity and attributes stored across multiple identity management systems. These systems use common protocols and communication standards to securely link ...
Dell Adds Orchestration Capabilities to Data Protection Platform
Dell Technologies added orchestration capabilities to its data protection software that makes it simpler for IT teams to schedule backup ...
Daniel Stori’s ‘Annoying Software’
via the inimitable Daniel Stori, crafting superb comics at turnoff.us! Permalink ...