The NCSC’s Ollie Whitehouse criticizes security vendors for actively working against organizations in their fight against breaches and ransomware. Read More
Our topic for today seems to be centered around the most common 10 DNS attacks and how to effectively mitigate them. We’ll dive into the details of each attack,…
Should CISOs include only known information in the SEC filings for a material security incident, or is there room to include details that may change during the investigation? Read More
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst the ongoing Israeli-Hamas war.
“This malware is an x64 ELF executable, lacking obfuscation or protective measures,” Security Joes said in a new report published today. “It allows attackers to specify target folders and can potentially destroy an entire