Cyber Security Headlines
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com
Cyber Security Headlines Read More »
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com
Cyber Security Headlines Read More »
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
The 443 | Security Simplified Read More »
Welcome to the second State of the Internet / Security report of 2021. Whether you’re a new reader or someone who’s been reading for years, we’re glad you’re reading this issue. As always, we continuously strive to improve our work and bring you something new with every effort. You may remember our gaming security issue
Chairman of the Institute for Integrated Economic Research Executive Member, Australian Security Leaders Climate Group John is a consultant in the field of Defence and National Security. He is a Fellow of the Royal Society of NSW, the Institute For Regional Security, the Sir Richard Williams Foundation and the Australian Institute of Energy. He has
Bitdefender has released research on a new RIG Exploit Kit campaign targeting unpatched Internet Explorer web browsers. The campaign exploits VBScript vulnerabilities CVE-2019-0752 and CVE-2018-8174 to deliver a variant of WastedLocker minus the actual ransomware component. The new variant, dubbed WastedLoader by Bitdefender communicates with a C&C acting as a downloader for injecting various payloads
WastedLoader’ Campaign Targets Unpatched IE Browsers Read More »
Senior Director Security Strategy at Cato Networks I am cybersecurity enthusiast with a track record both as an individual contributor and as a team and group manager. Passionate about security, threat intelligence, education and team work. I was honored to be chosen as one of 17 “IBM Rockstar Employees” by Business Insider.http://www.businessinsider.com/ibm-rock-star-employees-2015-4#dark-net-prowler-etay-maor-3 I have vast
Senior Director, Sophos Managed Threat Response Mat Gangwer, Senior Director, Sophos Managed Threat Response stated “These vulnerabilities are significant and need to be taken seriously. They allow attackers to remotely execute commands on these servers without the need for credentials, and any threat actor could potentially abuse them. The broad installation of Exchange and its exposure
Chief Executive Officer, DefendTex Pty Ltd A proven track record of delivering technical innovation, from conception to delivery across a broad spectrum of industries, including military, law enforcement, IT and retail. Specialties: Software development, research and development, video tracking, facial recognition, mobile applications, virtual reality Mysec.TV Australian space launch capability – Rotating Detonation Engine Research
Cryptography and Quantum Security Researcher I am a mathematician and computer security scientist, with a strong interest in cryptography and anonymity, and in quantum computing and quantum cryptography in particular. I am also a privacy hacktivist and public speaker, with connections to the world of cybersecurity and experience in network and system administration. I performed
Dr Tommaso Gagliardoni Read More »
Lead, Strategic Initiatives, Centre for Cybersecurity, World Economic Forum Women in IT Security: Woman of Influence by SC Magazine, August 2019 | 100 Lithuanian Women of influence in business, politics and national security, July 2018 | Visiting Lecturer at Harvard University, Cybersecurity: The Intersection of Policy and Technology Executive Education | Visiting lecturer at Yale
Algirde Pipikaite Read More »