From the frontlines: Our CISO’s view of Pacific Rim
On beyond “Detect and Respond” and “Secure by Design”
On beyond “Detect and Respond” and “Secure by Design”
Thirty-five years after the first great cat-and-mouse infosecurity story, here we are again
What our incident responders know from five years of fighting an octopus
Decades of obsolete and unpatched hardware and software endanger us all
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices
In this week’s episode your hosts practice standing on one leg, Carole gives Graham a deepfake quiz, and we investigate how Strava may be exposing the movements of world leaders…..
This is an overview of CVE-2024-29506, CVE-2024-29507, CVE-2024-29508, and CVE-2024-29509. A set of memory-corruption-related vulnerabilities in Ghostscript ≤ 10.02.1. These are all the remaining bugs from our research which we….
One topic being actively researched in connection with the breakout of LLMs is capability uplift – when employees with limited experience or resources in some area become able to perform at….
This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after everything from our browsers to those fancy cameras that zoom and spin…..
As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit….