“Puss in Boots” APT campaign
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
3201 articles
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
For this episode, Jeff flies solo while Dave is on vacation. Listen for the latest in Twitter’s Tailored Audience snafu, the US, UK, and Australia looking for encryption backdoors, and more.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
Here’s why when trying to download Kaspersky Free antivirus you get Kaspersky Security Cloud Free (and why that’s good news).
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.
On this podcast, Jeff is joined by Oksana, Kate, Julia and Anya in Moscow to discuss what privacy means to them.
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.
What cyberimmunity means in practice and in the industrial infrastructure environment.
Jeff and Dave discuss the reduction of human listening for Google Home, AI being used in schools, TikTok scams, and more.
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
According to recent news, quantum supremacy is reached. What should we do about it?
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Jeff and Dave discuss the latest hurdles for the Equifax breach settlement, Entercom being hit with ransomware, and more.