Incident Response
Safe Security Buys RiskLens to Advance Cybersecurity Risk Management
Safe Security acquired RiskLens, a pioneer in the development of the Factor Analysis of Information Risk (FAIR) quantification standard for assessing cybersecurity risk ...
Third Party Lets Pepsi Data Out of the Bottle, PII Nicked
Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ...
NETSCOUT Uses Machine Learning to Help Thwart DDoS Attacks
NETSCOUT Systems is is dynamically applying machine learning algorithms to combat distributed denial-of-service (DDoS) attacks ...
Concerns About Infostealer Malware on the Rise
A SpyCloud report found more than half of respondents are extremely concerned about their ability to thwart attacks that exfiltrate authentication data ...
StackRot: Linux Bug so bad Linus Dives Into Code to Fix It
Maple Tree Side Effects: Torvalds feels the pressure, fixes lazy locks ...
Finding the Right Tools for Response and Visibility in the SOC
One of the more difficult tasks for a cybersecurity professional—from the CISO to the person responsible for log management in the SOC—is to convey the importance of security, compliance and governance to ...
Contec SolarView: Critical Bug Unpatched After 14 MONTHS
PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems ...
Using Machine Learning to Find Vulnerabilities and Prevent Cyberattacks
By implementing ML, organizations can detect a network intrusion, find the anomaly and stop it before any damage is caused. ...
‘Wagner Mercenary’ Hackers Destroy Russian Satellite Comms
Dozor-Teleport hack, vandalism and data breach. But is it a Ukrainian false flag op? ...