Recon Technologies
Cyber Security

Protecting | Educating | Inventing

Latest Threats
Why Password Hygiene Needs a RebootExperts Warn About Ongoing AutoHotkey-Based Malware AttacksU.S. Pipeline Ransomware Attackers Go Dark After Servers and Bitcoin Are SeizedRapid7 Source Code Accessed in Supply Chain AttackHow Faster COVID-19 Research Is Being Made Possible by Secure SiliconCisco Confirms Plans to Acquire Kenna SecurityHackers Using Microsoft Build Engine to Deliver Malware FilelesslyChart: Cybersecurity Now a Top Corporate PrioritySOC Teams Burdened by Alert Fatigue Explore XDRWi-Fi Design, Implementation Flaws Allow a Range of Frag AttacksSecurity Trends to Follow at RSA Conference 2021Report to Your Management with the Definitive 'Incident Response for Management' Presentation TemplatePakistan-Linked Hackers Added New Windows Malware to Its ArsenalMagecart Hackers Now hide PHP-Based Backdoor In Website FaviconsBig Cybersecurity Tips For Remote Workers Who Use Their Own TechColonial Pipeline Paid Nearly $5 Million in Ransom to CybercriminalsRapid7 Source Code Breached in Codecov Supply-Chain AttackSoftware, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order85% of Data Breaches Involve Human Interaction: Verizon DBIRFirms Struggle to Secure Multicloud MisconfigurationsDragos & IronNet Partner on Critical Infrastructure SecurityWhen AI Becomes the HackerMicrosoft Adds GPS Location to Identity & Access Control in Azure ADAdapting to the Security Threat of Climate ChangeDefending the Castle: How World History Can Teach Cybersecurity a LessonVerizon DBIR 2021: “Winners” No Surprise, But All-round Vigilance EssentialCan Data Protection Systems Prevent Data At Rest Leakage?Dark Web Getting Loaded With Bogus Covid-19 Vaccines and Forged CardsDespite Heightened Breach Fears, Incident Response Capabilities LagResearchers Unearth 167 Fake iOS & Android Trading AppsPutting The Spotlight on DarkSide66% of CISOs Feel Unprepared for CyberattacksVulnerable Protocols Leave Firms Open to Further CompromisesHashes, Salts, and Rainbow Tables: Confessions of a Password CrackerCybersecurity: What Is Truly Essential?Why You Should Be Prepared to Pay a RansomThe Long Road to Rebuilding Trust after 'Golden SAML'-Like AttacksNearly All Wi-Fi Devices Are Vulnerable to New FragAttacksLatest Microsoft Windows Updates Patch Dozens of Security FlawsRansomware Gang Leaks Metropolitan Police Data After Failed NegotiationsAlert: Hackers Exploit Adobe Reader 0-Day Vulnerability in the WildA Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the NormAdobe Issues Patch for Acrobat Zero-DayApplication Attacks Spike as Criminals Target Remote WorkersMicrosoft Patch Tuesday: 4 Critical CVEs, 3 Publicly Known, 1 WormableCartoon Caption Winner: Greetings, Earthlings3 Cybersecurity Myths to BustCritical Infrastructure Under AttackLIVE Webinar — The Rabbit Hole of AutomationU.S Intelligence Agencies Warn About 5G Network WeaknessesExperts warn of a new Android banking trojan stealing users' credentialsU.S. Declares Emergency in 17 States Over Fuel Pipeline Cyber AttackColonial Pipeline Cyberattack: What Security Pros Need to KnowTulsa Deals with Aftermath of Ransomware AttackFour Plead Guilty to RICO Conspiracy Involving Hosting Services for Cybercrime10 Security Awareness Training Mistakes to AvoidExchange Exploitation: Not Dead YetOver 25% Of Tor Exit Relays Are Spying On Users' Dark Web ActivitiesIs it still a good idea to require users to change their passwords?Four Plead Guilty to Aiding Cyber Criminals with Bulletproof HostingRansomware Cyber Attack Forced the Largest U.S. Fuel Pipeline to Shut DownFacebook Will Limit Your WhatsApp Features For Not Accepting Privacy PolicyTop 12 Security Flaws Russian Spy Hackers Are Exploiting in the WildHow North Korean APT Kimsuky Is Evolving Its TacticsMost Organizations Feel More Vulnerable to Breaches Amid PandemicFBI, NSA, CISA & NCSC Issue Joint Advisory on Russian SVR Activity4 Major Privacy and Security Updates From Google You Should Know AboutThe Edge Pro Quote: Password EmpowermentDefending Against Web Scraping Attacks6 Unpatched Flaws Disclosed in Remote Mouse App for Android and iOS11 Reasons Why You Sorta Love PasswordsNew TsuNAME Flaw Could Let Attackers Take Down Authoritative DNS ServersNew Stealthy Rootkit Infiltrated Networks of High-Profile OrganizationsTroy Hunt: Organizations Make Security Choices Tough for UsersNew Techniques Emerge for Abusing Windows Services to Gain System ControlGoogle Plans to Automatically Enable Two-Factor AuthenticationCISA Publishes Analysis on New 'FiveHands' RansomwareSecuring the Internet of Things in the Age of Quantum ComputingCloud-Native Businesses Struggle with SecurityCISO Challenge: Check Your Cybersecurity Skills On This New Competition SiteBiden's Supply Chain Initiative Depends on Cybersecurity InsightsHow to Move Beyond Passwords and Basic MFACritical Flaws Hit Cisco SD-WAN vManage and HyperFlex SoftwareNew Qualcomm Chip Bug Could Let Hackers Spy On Android DevicesNew Spectre Flaws in Intel and AMD CPUs Affect Billion of ComputersBlack Hat Asia Speakers Share Secrets About Sandboxes, Smart Doors, and SecurityAttackers Seek New Strategies to Improve Macros' EffectivenessGap Between Security and Networking Teams May Hinder Tech ProjectsDoD Lets Researchers Target All Publicly Accessible Info SystemsWanted: The (Elusive) Cybersecurity 'All-Star'Debating Law Enforcement's Role in the Fight Against CybercrimeWill 2021 Mark the End of World Password Day?New Study Warns of Security Threats Linked to Recycled Phone NumbersBIOS PrivEsc Bugs Affect Hundreds of Millions of Dell PCs WorldwideALERT — New 21Nails Exim Bugs Expose Millions of Email Servers to HackingNewer Generic Top-Level Domains a Security 'Nuisance'Apple Issues New Patches for Webkit Security FlawsPlanning Our Passwordless FutureHundreds of Millions of Dell Computers Potentially Vulnerable to AttackMore Companies Adopting DevOps & Agile for SecurityRaytheon: Supply Chain, Ransomware, Zero Trust Biggest Security PrioritiesScripps Health Responds to CyberattackCan Organizations Secure Remote Workers for the Long Haul?It's Time to Ditch Celebrity CybersecurityNew Pingback Malware Using ICMP Tunneling to Evade C&C DetectionHow Should the Service Desk Reset Passwords?Critical Patch Out for Critical Pulse Secure VPN 0-Day Under AttackApple Releases Urgent Security Patches For Zero‑Day Bugs Under Active AttacksResearchers Explore Active Directory Attack VectorsName That Edge Toon: Magical MayImperva to Buy API Security Firm CloudVectorBuer Malware Variant Rewritten in Rust Programming LanguageOver 40 Apps With More Than 100 Million Installs Found Leaking AWS KeysResearchers Find Bugs Using Single-Codebase InconsistenciesDark Reading Celebrates 15th AnniversaryStopping the Next SolarWinds Requires Doing Something DifferentThe Edge Pro Tip: Protect IoT DevicesA Rust-based Buer Malware Variant Has Been Spotted in the WildResearchers Uncover Iranian State-Sponsored Ransomware OperationNew Chinese Malware Targeted Russia's Largest Nuclear Submarine DesignerRansomware Task Force Publishes Framework to Fight Global ThreatNew Threat Group Carrying Out Aggressive Ransomware CampaignMITRE Adds MacOS, Linux, More Data Types to ATT&CK FrameworkMITRE Adds MacOS, More Data Types to ATT&CK FrameworkSurvey Finds Broad Concern Over Third-Party App Providers Post-SolarWindsGhost Town Security: What Threats Lurk in Abandoned Offices?The Ticking Time Bomb in Every Company's Code7 Modern-Day Cybersecurity RealitiesHackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware AttacksMicrosoft Finds 'BadAlloc' Flaws Affecting Wide-Range of IoT and OT DevicesHere's A New Forum for Cybersecurity Leaders Outside of the Fortune 2000Passwordstate Warns of Ongoing Phishing Attacks Following Data BreachXDR Pushing Endpoint Detection and Response Technologies to ExtinctionResearchers Connect Complex Specs to Software VulnerabilitiesAPI Hole on Experian Partner Site Exposes Credit Scores'BadAlloc' Flaws Could Threaten IoT and OT Devices: MicrosoftYour Digital Identity's Evil ShadowThe Challenge of Securing Non-People IdentitiesA New PHP Composer Bug Could Enable Widespread Supply-Chain AttacksLuckyMouse Hackers Target Banks, Companies and Governments in 2020How to Conduct Vulnerability Assessments: An Essential Guide for 2021Chinese Hackers Attacking Military Organizations With New BackdoorResearchers Uncover Stealthy Linux Malware That Went Undetected for 3 YearsAdobe Open Sources Tool for Anomaly ResearchFluBot Malware's Rapid Spread May Soon Hit US Phones74% of Financial Institutions See Spike in COVID-Related ThreatsFBI Works With 'Have I Been Pwned' to Notify Emotet VictimsHow to Secure Employees' Home Wi-Fi NetworksCartoon Caption Winner: Rough Patch?Is Your Cloud Raining Sensitive Data?Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute MalwareF5 BIG-IP Found Vulnerable to Kerberos KDC Spoofing VulnerabilityAttacks Targeting ADFS Token Signing Certificates Could Become Next Big ThreatAttention! FluBot Android Banking Malware Spreads Quickly Across EuropeDo Cyberattacks Affect Stock Prices? It Depends on the BreachEmotet Malware Uninstalled from Infected Devices10K Hackers Defend the Planet Against ExtraterrestrialsRansomware Recovery Costs Near $2M4 Ways CISOs Can Strengthen Their Security ResilienceExpect an Increase in Attacks on AI SystemsXDR: A Game-Changer in Enterprise Threat DetectionChallenging Our Education System to Nurture the Cyber PipelineHackers Threaten to Leak D.C. Police Informants' Info If Ransom Is Not PaidCybersecurity Webinar: Understanding the 2020 MITRE ATT&CK ResultsHackers Exploit 0-Day Gatekeeper Flaw to Attack MacOS ComputersFBI, CISA Uncover Tactics Employed by Russian Intelligence HackersUS Urges Organizations to Implement MFA, Other Controls to Defend Against Russian AttacksApple Patches Serious MacOS Security FlawIn Appreciation: Dan KaminskyProofpoint to Be Acquired by Thoma Bravo for $12.3BCybersecurity and the Way to a Balanced LifeShift Left: From Concept to PracticeMinnesota University Apologizes for Contributing Malicious Code to the Linux ProjectApple AirDrop Bug Could Leak Your Personal Info to Anyone NearbyHow to Test and Improve Your Domain's Email Security?Emotet Malware Destroys Itself Today From All Infected Computers3.2 Billion Leaked Passwords Contain 1.5 Million Records with Government EmailsCritical RCE Bug Found in Homebrew Package Manager for macOS and LinuxPasswordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCsWindow Snyder Launches Startup to Fill IoT Security GapsPassword Manager Suffers 'Supply Chain' AttackInsider Data Leaks: A Growing Enterprise ThreatKnowBe4 Issues IPO to Drive Global Expansion, New Automation FeaturesNew QNAP NAS Flaws Exploited In Recent Ransomware Attacks – Patch It!SOC 2 Attestation Tips for SaaS CompaniesTell Us the Truth: Why Do You LOVE Passwords?Prometei Botnet Exploiting Unpatched Microsoft Exchange ServersHackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds OrionSupernova Malware Actors Masqueraded as Remote Workers to Access Breached NetworkThe Edge Pro Tip: Brush Up on Web ShellsEdge Poll: Passwordless PlansNew CISA Advisories Warn of ICS VulnerabilitiesPrometei Botnet Adds New Twist to Exchange Server AttacksImproving the Vulnerability Reporting Process With 5 StepsUniversity Suspends Project After Researchers Submitted Vulnerable Linux PatchesName That Toon: Greetings, Earthlings10 Free Security Tools at Black Hat Asia 2021Looking for Greater Security Culture? Ask an 8-Bit PlumberResearchers Find Additional Infrastructure Used By SolarWinds HackersCost of Account Unlocks, and Password Resets Add UpWho's Your Login?Cybercriminals Using Telegram Messenger to Control ToxicEye MalwareFacebook Busts Palestinian Hackers' Operation Spreading Mobile SpywareRapid7 Acquires Velociraptor Open Source ProjectJustice Dept. Creates Task Force to Stop Ransomware SpreadZero-Day Flaws in SonicWall Email Security Tool Under AttackBusiness Email Compromise Costs Businesses More Than RansomwareHow to Attack Yourself Better in 2021Nearly Half of All Malware is Concealed in TLS-Encrypted CommunicationsAttackers Heavily Targeting VPN VulnerabilitiesImprove Your Cyber Security Posture by Combining State of the Art Security ToolsHackers threaten to leak stolen Apple blueprints if $50 million ransom isn't paidUpdate Your Chrome Browser ASAP to Patch a Week Old Public Exploit3 Zero-Day Exploits Hit SonicWall Enterprise Email Security AppliancesWARNING: Hackers Exploit Unpatched Pulse Secure 0-Day to Breach OrganizationsPulse Secure VPN Flaws Exploited to Target US Defense SectorForeign Spies Target British Nationals With Fake Social Media ProfilesAttackers Compromised Code-Checking Vendor's Tool for Two MonthsDept. of Energy Launches Plan to Protect Electric Grid from Cyberattack2020 Changed Identity Forever; What's Next?7 Old IT Things Every New InfoSec Pro Should KnowOver 750,000 Users Downloaded New Billing Fraud Apps From Google Play StoreBeware the Bug Bounty[eBook] Why Autonomous XDR Is Going to Replace NGAV/EDR120 Compromised Ad Servers Target Millions of Internet UsersLazarus APT Hackers are now using BMP images to hide RAT malwareWhite House Scales Back Response to SolarWinds & Exchange Server AttacksAttackers Test Weak Passwords in Purple Fox Malware AttacksLazarus Group Uses New Tactic to Evade DetectionSolarWinds: A Catalyst for Change & a Cry for CollaborationPasswordless: More Mirage Than RealityMalware Spreads Via Xcode Projects Now Targeting Apple's M1-based MacsSysAdmin of Billion-Dollar Hacking Group Gets 10-Year SentenceWhat are the different roles within cybersecurity?Pandemic Drives Greater Need for Endpoint SecurityHigh-Level Admin of FIN7 Cybercrime Group Sentenced to 10 Years in PrisonSecurity Gaps in IoT Access Control Threaten Devices and UsersHow the Biden Administration Can Make Digital Identity a RealitySevere Bugs Reported in EtherNet/IP Stack for Industrial SystemsSoftware Developer Arrested in Computer Sabotage CaseGoogle Brings 37 Security Fixes to Chrome 90US Formally Attributes SolarWinds Attack to Russian Intelligence AgencyPandemic Pushes Bot Operators to Redirect Efforts6 Tips for Managing Operational Risk in a DownturnUS Sanctions Russia and Expels 10 Diplomats Over SolarWinds CyberattackHow to Create an Incident Response Plan From the Ground, UpNation-State Attacks Force a New Paradigm: Patching as Incident ResponseMalicious PowerShell Use, Attacks on Office 365 Accounts Surged in Q41-Click Hack Found in Popular Desktop Apps — Check If You're Using ThemMalware Variants: More Sophisticated, Prevalent and Evolving in 2021YIKES! Cybercriminals flood the Internet with 100,00 malicious PDF documentsThycotic & Centrify Merge to Form Cloud Identity Security FirmCISA Urges Caution for Security Researchers Targeted in Attack CampaignFBI Operation Remotely Removes Web Shells From Exchange ServersThe CISO Life Is Half as GoodNew WhatsApp Bugs Could've Let Attackers Hack Your Phone RemotelyNew JavaScript Exploit Can Now Carry Out DDR4 Rowhammer AttacksBolstering Our Nation's Defenses Against Cybersecurity AttacksDependency Problems Increase for Open Source ComponentsSimplify, then Add Lightness – Consolidating the Technology to Better Defend OurselvesUpdate Your Chrome Browser to Patch 2 New In-the-Wild 0-Day ExploitsNSA Discovers New Vulnerabilities Affecting Microsoft Exchange ServersTest-DEU-169665DNS Vulnerabilities Expose Millions of Internet-Connected Devices to AttackNSA Alerted Microsoft to New Exchange Server VulnerabilitiesCompromised Microsoft Exchange Server Used to Host CryptominerGlobal Dwell Time Drops as Ransomware Attacks AccelerateDark Reading to Upgrade Site Design, Performance5 Objectives for Establishing an API-First Security StrategyClear & Present Danger: Data Hoarding Undermines Better SecurityNew NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT DevicesHackers Using Website's Contact Forms to Deliver IcedID MalwareDetecting the “Next” SolarWinds-Style Cyber AttackBRATA Malware Poses as Android Security Scanners on Google Play StoreRCE Exploit Released for Unpatched Chrome, Opera, and Brave BrowsersIndian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users' DataWindows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021What Does It Take To Be a Cybersecurity Researcher?Alert — There's A New Malware Out There Snatching Users' PasswordsHackers Tampered With APKPure Store to Distribute Malware Apps[WHITEPAPER] How to Achieve CMMC Security Compliance for Your BusinessResearchers uncover a new Iranian malware used in recent cyberattacksCisco Will Not Patch Critical RCE Flaw Affecting End-of-Life Business RoutersGigaset Android Update Server Hacked to Install Malware on Users' DevicesHackers Exploit Unpatched VPNs to Install Ransomware on Industrial TargetsMITRE Madness: A Guide to Weathering the Upcoming Vendor Positioning StormNIST and HIPAA: Is There a Password Connection?PHP Site's User Database Was Hacked In Recent Source Code Backdoor AttackPre-Installed Malware Dropper Found On German Gigaset Android PhonesAndroid to Support Rust Programming Language to Prevent Memory Flaws11 Useful Security Tips for Securing Your AWS EnvironmentWhatsApp-based wormable Android malware spotted on the Google Play StoreCritical Auth Bypass Bug Found in VMware Data Center Security ProductExperts uncover a new Banking Trojan targeting Latin American usersWatch Out! Mission Critical SAP Applications Are Under Active Attack533 Million Facebook Users' Phone Numbers and Personal Data Leaked OnlineHackers From China Target Vietnamese Military and GovernmentHackers Targeting professionals With 'more_eggs' Malware via LinkedIn Job OffersHow the Work-From-Home Shift Impacts SaaS SecurityHow Cyrebro Can Unify Multiple Cybersecurity Defenses to Optimize ProtectionMicrosoft Exchange Exploits: 9 Lessons for DefendersContemplating the Coffee Supply Chain: A Horror StoryCan a Programming Language Reduce Vulnerabilities?Power Equipment: A New Cybersecurity FrontierMicrosoft Reports 'DearCry' Ransomware Targeting Exchange ServersF5 Networks Urges Customers to Update to New Versions of Its App Delivery TechNetwork Pivots, Patch Bypasses: Exploits Hit Hard in 2020Molson Coors Beer Operations Halted by HackDoes XDR Mark the Spot? 6 Questions to AskMicrosoft Exchange Server Exploit Code Posted to GitHubActionable Tips for Engaging the Board on Cybersecurity5 Steps for Investigating Phishing AttacksMalware Operator Employs New Trick to Upload its Dropper into Google PlayUS Schools Faced Record Number of Security Incidents in 2020'Thousands' of Verkada Cameras Affected by Hacking BreachMultiple Attack Groups Exploited Microsoft Exchange Flaws Prior to the PatchesHiding in Plain Sight: Protecting Enterprises from the 'New' Shadow ITHow to Protect Vulnerable Seniors From CybercrimeBlack Hat USADigitally Transforming Trusted Transactions Through Biometrics, ML & AICall Recorder iPhone App Flaw UncoveredPrivacy in Practice: Securing Your Data in 2021 and BeyondMicrosoft Patch Tuesday Fixes 82 CVEs, Internet Explorer Zero-DayLinux Foundation Debuts Sigstore Project for Software SigningWhy MITRE ATT&CK Matters?Dark Reading 'Name That Toon' Winner: Gather 'Round the CampfireSeven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates48% of Security Pros Prohibited From Intelligence-SharingCOVID-19 Contact-Tracing Apps Signal Broader Mobile App Security ConcernsLeaked Development Secrets a Major Issue for RepositoriesMicrosoft Pushes Patches for Older Versions of Exchange ServerLook to Banking as a Model for Stopping Crime-as-a-ServiceKnowBe4 Buys Competitor MediaPROMcAfee to Sell Enterprise Business to Equity Firm STG for $4BMicrosoft Exchange Server Attack Escalation Prompts Patching PanicIntel, Microsoft Aim for Breakthrough in DARPA Encryption ProjectThe Edge Pro Tip: Proceed With CautionHow a Group of McAfee Team Members Helped Change the Lives of Critically Ill ChildrenShiva’s Tragic Accident Turns into a Story of ResilienceHow McAfee’s Inclusive Maternity Benefits Helped Me Thrive as a New MomWhy Data Privacy Should Be on President Biden's Agenda for His First 100 DaysMcAfee ATR Thinks in GraphsAttention Android Users: This Free VPN App Leaked the Data of 21 Million UsersMicrosoft Exchange Server Exploits Hit Retail, Government, EducationMicrosoft Adopted an 'Aggressive' Strategy for Sharing SolarWinds Attack Intel5 Ways Social Engineers Crack Into Human BeingsRealistic Patch Management Tips, Post-SolarWindsOn International Women's Day 2021, Does the 'Rule of Steve' Still Apply? Yes.The Fastest Route to SASEEncrypted Traffic StrategiesMake Sure That Stimulus Check Lands in the Right Bank AccountBusiness Apps Spoofed in 45% of Impersonation AttacksHealthcare Still Seeing High Level of Attacker ActivityMicrosoft, FireEye Uncover More Malware Used in the SolarWinds CampaignJohn McAfee Charged in 'Pump & Dump' Cryptocurrency SchemeSecure Laptops & the Enterprise of the FutureNew Social Security Scam Spoofs Government BadgesQualys Is the Latest Victim of Accellion Data BreachWhy We Need More Blue Team Voices at the TableIntel: More Than 90% of Our Vulnerabilities Found via ResearchMore Details Emerge on the Microsoft Exchange Server AttacksIntel: Paid Research Caught More Than 90% of Our VulnerabilitiesOkta to Buy Rival Auth0CISA to Federal Agencies: Immediately Patch or 'Disconnect' Microsoft Exchange ServersLet’s Commit To Protect Our Privacy This YearHow SolarWinds Busted Up Our Assumptions About Code SigningDesign, Security, Tech Is the New Stack You Should Be BuildingDon’t Let Tax Fraud Ruin Your IRS RefundWho loves tax season besides accountants? HackersHow to Spot, and Prevent, the Tax Scams That Target EldersHow Enterprises are Developing Secure ApplicationsPolicy Group Calls for Public-Private Cyber-Defense ProgramMicrosoft Ignite Brings Security & Compliance Updates'ObliqueRAT' Now Hides Behind Images on Compromised WebsitesMicrosoft Fixes Exchange Server Zero-Days Exploited in Active AttacksThycotic and Centrify to Merge In $1.4B DealGoogle Partners With Insurers to Create Risk Protection Program4 Ways Health Centers Can Stop the Spread of CyberattacksHacking Proprietary Protocols with Sharks and PandasWhy Cloud Security Risks Have Shifted to Identities and EntitlementsName That Edge Toon: In Hot WaterAttacker Expands Use of Malicious SEO Techniques to Distribute MalwareUniversal Health Services Suffered $67 Million Loss Due to Ransomware AttackNew Jailbreak Tool Works on Most iPhonesMSP Provider Builds Red Team as Attackers Target IndustryBuilding a Next-Generation SOC Starts With Holistic OperationsHow Criminals Job Hunt on the Dark WebCybercrime 'Help Wanted': Job Hunting on the Dark WebSupporting the Women Hit Hardest by the Pandemic6 Steps to Help Your Family Restore Digital Balance in Stressful TimesNSA Releases Guidance on Zero-Trust Architecture'Nerd' HumorThe Edge Pro Tip: Fasten Your SeatbeltsSecuring Super Bowl LVAttackers Turn Struggling Software Projects Into Trojan HorsesAfter a Year of Quantum Advances, the Time to Protect Is NowInside Strata's Plans to Solve the Cloud Identity PuzzleMicrosoft Releases Free Tool for Hunting SolarWinds MalwareNorth Korea's Lazarus Group Expands to Stealing Defense SecretsRansomware, Phishing Will Remain Primary Risks in 2021Thousands of VMware Servers Exposed to Critical RCE Bug5 Key Steps Schools Can Take to Defend Against Cyber ThreatsSOC Health Check: Prescribing XDR for Enterprises How to Avoid Falling Victim to a SolarWinds-Style AttackCybercriminals Target QuickBooks DatabasesNew APT Group Targets Airline Industry & Immigration61% of Malware Delivered via Cloud Apps: ReportGoogle Invests in Linux Kernel Developers to Focus on SecurityKaseya Buys Managed SOC ProviderThe Realities of Extended Detection and Response (XDR) TechnologyUniversities Face Double Threat of Ransomware, Data BreachesCartoon Caption Winner: Be Careful Who You Trust3 Security Flaws in Smart Devices & IoT That Need FixingBotnet Uses Blockchain to Obfuscate Backup Command & Control InformationBabuk RansomwareSolarWinds Attackers Lurked for 'Several Months' in FireEye's NetworkFormer CISA Director Chris Krebs Discusses Risk Management & Threat IntelSonicWall Releases Second Set of February Firmware Patches10K Targeted in Phishing Attacks Spoofing FedEx, DHL ExpressAugmenting SMB Defense Strategies With MITRE ATT&CK: A PrimerSecurity + Fraud Protection: Your One-Two Punch Against CyberattacksCVSS as a Framework, Not a ScoreChinese-Affiliated APT31 Cloned & Used NSA Hacking ToolCybercrime Groups More Prolific, Focus on Healthcare in 2020Accellion Data Breach Resulted in Extortion Attempts Against Multiple VictimsResearcher Reports Vulnerability in Apple iCloud DomainSequoia Capital Suffers Data Breach8 Ways Ransomware Operators Target Your NetworkWhat Can Your Connected Car Reveal About You?Cybersecurity Responsibility in a Post-Pandemic WorldKia Denies Ransomware Attack as IT Outage ContinuesAttackers Already Targeting Apple's M1 Chip with Custom MalwareOmdia's On-Demand WebinarsHow to Fine-Tune Vendor Risk Management in a Virtual WorldBeyond Clubhouse: Vulnerable Agora SDKs Still in Widespread UseMicrosoft Concludes Internal Investigation into Solorigate BreachCrowdStrike Buys Log Management Startup Humio for $400MApple Offers Closer Look at Its Platform Security Technologies, FeaturesMicrosoft Azure Front Door Gets a Security UpgradeHiding in Plain Sight: What the SolarWinds Attack Revealed About EfficacyData security accountability in an age of regular breachesHow to Run a Successful Penetration TestVirginia Takes Different Tack Than California With Data Privacy LawPro Tip: Say What You KnowThe Edge Pro Tip: Say What You KnowEgregor Arrests a Blow, But Ransomware Will Likely Bounce BackUS Unseals Indictments Against North Korean Cyberattackers for Thefts Totaling $1.3BHow 2020 Has Shaped The Way We Live Our LivesWhite House Says 100 Private Sector Orgs Hit in SolarWinds CampaignMillions Affected by Malware Attributed to Android Barcode-Scanning App Kia Faces $20M DoppelPaymer Ransomware AttackDomain Age as an Internet Filter CriteriaRansomware? Let's Call It What It Really Is: ExtortionwareBreach Etiquette: How to Mind Your Manners When It MattersEnterprise Windows Threats Drop as Mac Attacks Rise: Report4 Predictions for the Future of PrivacyDon’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDKHang Up on Hackers: Protect Yourself from Mobile App Video Conferencing VulnerabilitiesCompromised Credentials Show That Abuse Happens in Multiple PhasesFirms Patch Greater Number of Systems, but Still SlowlyStrata Identity Raises $11M in Series A RoundUnder Attack: Hosting & Internet Service ProvidersBalancing Digital: Helping Your Family Manage Ongoing StressPalo Alto Networks Plans to Acquire Cloud Security FirmAre You Ready for XDR?Fighting Fileless Malware, Part 3: MitigationsBlack History Month 2021: Time to Talk Diversity and CybersecurityTrue Security Requires a Holistic ApproachMalware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees100+ Financial Services Firms Targeted in Ransom DDoS Attacks in 2020How to Submit a Column to Dark ReadingWater Utility Hack Could Inspire More IntrudersYou've Got Cloud Security All Wrong: Managing Identity in a Cloud WorldRansomware Attackers Set Their Sights on SaaSGrowing Collaboration Among Criminal Groups Heightens Ransomware Threat for Healthcare SectorPandemic Initially Led to Fewer Disclosed Vulnerabilities, Data SuggestsHere’s What I’m Doing to Avoid Being Caught Up in A Puppy ScamMicrosoft Launches Phase 2 Mitigation for Zerologon FlawGame Over: Stopping DDoS Attacks Before They Start7 Things We Know So Far About the SolarWinds AttacksUnemployment Fraud: As If Being Out of Work Wasn't Bad EnoughCloud-Native Apps Make Software Supply Chain Security More Important Than EverOn the Radar: Twingate Offers an Easy-to-Use Zero-Trust Access ServiceHigh-Severity Vulnerabilities Discovered in Multiple Embedded TCP/IP StacksXDR – Please Explain?SASE Surge: Why the Market Is Poised to GrowZero Trust in the Real WorldWhy it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s DayMultivector Attacks Demand Security Controls at the Messaging LevelFlorida Water Utility Hack Highlights Risks to Critical InfrastructureMicrosoft Fixes Windows Zero-Day in Patch Tuesday RolloutResearchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network StackSentinelOne Buys Data Analytics Company ScalyrHow Neurodiversity Can Strengthen Cybersecurity DefenseMicrosoft & Facebook Were Phishers' Favorite Brands in 2020Europe’s Quantum Story is Accelerating, and the World Will be Better for itSolarWinds Attack Reinforces Importance of Principle of Least PrivilegeFighting Fileless Malware, Part 2: CountermeasuresIranian Cyber Groups Spying on Dissidents & Others of Interest to GovernmentEmotet Takedown: Short-Term Celebration, Long-Term ConcernsMalicious Code Injected via Google Chrome Extension Highlights App RisksHacker Raised Chemical Settings at Water Treatment to Dangerous LevelsWhat's the Difference Between 'Observability' and 'Visibility' in Security?Android App Infects Millions of Devices With a Single UpdateHidden Dangers of Microsoft 365's Power Automate and eDiscovery ToolsCartoon Caption Winner: Insider ThreatLets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer OnlineSpotify Hit With Another Credential-Stuffing AttackSecurity Researchers Push for 'Bug Bounty Program of Last Resort'6 Best Practices for SecOps in the Wake of the Sunburst Threat CampaignPro Tip: Don't Doubt YourselfCybercrime Goes MainstreamAI and APIs: The A+ Answers to Keeping Data Secure and PrivateGoogle's Payout to Bug Hunters Hits New HighIBM Offers $3M in Grants to Defend Schools from CyberattacksMicrosoft Says It's Time to Attack Your Machine-Learning ModelsWeb Application Attacks Grow Reliant on Automated ToolsSOCwise Series: Practical Considerations on SUNBURSTIs $50,000 for a Vulnerability Too Much?Patch Imperfect: Software Fixes Failing to Shut Out AttackersAn Observability Pipeline Could Save Your SecOps TeamSolarWinds Attackers Spent Months in Corporate Email System: ReportWhat I Wish I Knew at the Start of My InfoSec CareerSecurity in a Complex WorldConcerns Over API Security Grow as Attacks IncreaseFTC: ID Theft Doubled in 2020Agent Tesla Upgrades with New Delivery & Evasion TacticsAverage Ransom Payments Declined Last QuarterRF Enables Takeover of Hostile DronesAttackers Continue to Nibble at Apple's iOS SecuritySonicWall Confirms Zero-Day VulnerabilityFighting Fileless Malware, Part 1: What Is It?How Recruiting Women Can Help Solve Security's Biggest ProblemsInterview With a Russian CybercriminalBlack Hat AsiaData on 1.4 Million Washington State Residents BreachedIncrease in Physical Security Incidents Adds to IT Security PressuresEdge Poll: Hook, Line, and SinkerName That Edge Toon: Be Careful Who You TrustUS Needs Comprehensive Policy to Combat China on IP TheftRapid7 Acquires Alcide, Strengthens Focus on CloudStrengthening Zero-Trust Architecture6 Cybersecurity Start-Up Trends to TrackCloud Security Startup Armo Emerges from Stealth with $4.5MFBI Encounters: Reporting an Insider Security Incident to the FedsRansomware Payoffs Surge by 311% to Nearly $350 MillionDigital Marriage—Making Sure Your Online Wedding is Safe and SecureIs the Web Supply Chain Next in Line for State-Sponsored Attacks?2020 Marked a Renaissance in DDoS AttacksLaw Enforcement Aims to Take Down Netwalker RansomwareShinyHunters Exposes Over 125 Million Online Credentials10 Easy Ways to Build Up Your Family’s Online SecuritySchrems II – A few Things to Keep in Mind!This Data Privacy Day Own Your Privacy, Even On Social SitesBreach Data Highlights a Pivot to Orgs Over IndividualsDigital Identity Is the New Security Control PlaneBuilding Your Personal Privacy Risk Tolerance ProfileApp Variety — and Security Innovation — Surged in 2020Data Privacy Day 2021: Pandemic Response Data Must Align with Data Privacy RulesIntl. Law Enforcement Operation Disrupts Emotet BotnetCritical Vulnerability Patched in 'sudo' Utility for Unix-Like OSesMicrosoft Security Business Exceeds $10B in Revenue4 Clues to Spot a Bot NetworkMany Cybersecurity Job Candidates Are Subpar, While On-the-Job Training Falls ShortApple Patches Three iOS Zero-Day VulnerabilitiesMcAfee ATR Launches Education-Inspired Capture the Flag Contest!Security's Inevitable Shift to the EdgeLogoKit Group Aims for Simple Yet Effective PhishingRansomware Disrupts Operations at Packaging Giant WestRockPay-Or-Get-Breached Ransomware Schemes Take OffNorth Korean Attackers Target Security Researchers via Social Media: GooglePrivacy Teams Helped Navigate the Pivot to Work-from-HomeMimecast: Recent Certificate Compromise Tied to SolarWinds AttacksBEC Scammers Find New Ways to Navigate Microsoft 365Cartoon Caption Winner: Before I Go …Fighting the Rapid Rise of Cyber Warfare in a Changing WorldNew Year, New Digital You: Consumer Security Findings from McAfee’s Latest ReportNew Year, New Digital You: Canadian Survey Findings from McAfeeSAML: The Language You Don't Know You're SpeakingLearn SAML: The Language You Don't Know You're Already SpeakingMainframe Security Automation Is Not a LuxuryStartup Offers Free Version of its 'Passwordless' TechnologyClaroty Discloses Multiple Critical Vulns in Vendor Implementations of Key OT ProtocolCritical Vulns Discovered in Vendor Implementations of Key OT ProtocolSonicWall Is Latest Security Vendor to Disclose CyberattackDeloitte & Touche Buys Threat-Hunting FirmSmall Security Teams Have Big Security Fears, CISOs ReportTake It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)How to Better Secure Your Microsoft 365 Environment2020's COVID Accelerated Digitalization Demands Stronger Cybersecurity in 2021Comparing Different AI Approaches to Email SecurityIntel Confirms Unauthorized Access of Earnings-Related DataSpeed of Digital Transformation May Lead to Greater App VulnerabilitiesHow Cybersecurity Newbs Can Start Out on the Right FootWhy North Korea Excels in CybercrimeThe Connected Lives of Babies: Protecting Their First Footprints in the Digital WorldDreamBus, FreakOut Botnets Pose New Threat to Linux SystemsBreach Data Shows Attackers Switched Gears in 2020Attackers Leave Stolen Credentials Searchable on GoogleCloud Jacking: The Bold New World of Enterprise Cybersecurity7 Steps to Secure a WordPress SiteHacker Pig Latin: A Base64 Primer for Security AnalystsRethinking IoT Security: It's Not About the DevicesMicrosoft Releases New Info on SolarWinds Attack ChainRansomware and DDoS is on the Rise: Tips for Distance Learning in 2021SolarWinds Attack, Cyber Supply Chain Among Priorities for Biden AdministrationName That Toon: Insider ThreatThe Connected Lives of Babies: Protecting First Footprints in the Digital World, Part TwoTips for a Bulletproof War Room StrategyVulnerabilities in Popular DNS Software Allow PoisoningMicrosoft to Launch 'Enforcement Mode' for Zerologon FlawSolarWinds Attack Underscores 'New Dimension' in Cyber-Espionage TacticsThe Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 14 Intriguing Email Attacks Detected by AI in 2020The Most Pressing Concerns Facing CISOs TodayA Security Practitioner's Guide to Encrypted DNSNSA Appoint Rob Joyce as Cyber DirectorNSA Appoints Rob Joyce as Cyber DirectorTwo Pink LinesHonoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage CommunitySuccessful Malware Incidents Rise as Attackers Shift TacticsHow to Achieve Collaboration Tool ComplianceName That Toon: Before I Go …These Kids Are All RightCES 2021: Highlights From the “Cleanest” Show Yet!Shifting Privacy Landscape, Disruptive Technologies Will Test Businesses'Chimera' Threat Group Abuses Microsoft & Google Cloud ServicesBusinesses Struggle with Cloud Availability as Attackers Take AimNSA Recommends Using Only 'Designated' DNS ResolversWho Is Responsible for Protecting Physical Security Systems From Cyberattacks?Vulnerability Management Has a Data ProblemA Year in Review: Threat Landscape for 2020SolarWinds Attackers May Have Hit Mimecast, Driving New ConcernsHuntress Acquires EDR Technology From Level EffectVirtual Pen-Testing Competition Tasks College Students With Running a Red Team OperationUnderstanding TCP/IP Stack Vulnerabilities in the IoTThe Data-Centric Path to Zero TrustTop Security Threats to Look Out for in 20212021 Threat Predictions ReportMore SolarWinds Attack Details EmergeUnited Nations Security Flaw Exposed 100K Staff RecordsMicrosoft Defender Zero-Day Fixed in First Patch Tuesday of 2021How to Boost Executive Buy-In for Security InvestmentsSecurity Operations Struggle to Defend Value, Keep WorkersBringing Zero Trust to Secure Remote AccessOver-Sharer or Troublemaker? How to Identify Insider-Risk PersonasIntel's New vPro Processors Aim to Help Defend Against RansomwareIoT Vendor Ubiquiti Suffers Data BreachSolarWinds Hack Lessons Learned: Finding the Next Supply Chain AttackUS Capitol Attack a Wake-up Call for the Integration of Physical & IT SecurityNew Tool Sheds Light on AppleScript-Obfuscated MalwareWhen It Comes To Security Tools, More Isn't MoreRussian Hacker Sentenced to 12 Years for Role in Breaches of JP Morgan, OthersMalware Developers Refresh Their Attack ToolsCartoon: Shakin' It Up at the OfficeSolarWinds Hires Chris Krebs and Alex Stamos for Breach RecoveryTop 5 'Need to Know' Coding Defects for DevSecOpsCobalt Strike & Metasploit Tools Were Attacker Favorites in 2020FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds AttackState Dept. to Create New Cybersecurity & Technology AgencyEven Small Nations Have Jumped into the Cyber Espionage GameRansomware Victims' Data Published via DDoSecretsHow the Shady Zero-Day Sales Game Is EvolvingMcAfee Welcomes its ISO 27701 Certificate!The 3 Most Common Types of BEC Attacks (And What You Can Do About Them)Boost detection & stop attacksWhat's next for DC firewalls?Healthcare Organizations Bear the Brunt of Cyberattacks Amid PandemicNissan Source Code Leaked via Misconfigured Git ServerDoJ's Microsoft 365 Email Accounts Compromised in SolarWinds AttacksFriction Affliction: How to Balance Security With User ExperienceHow to Protect Your Organization's Digital Footprint6 Open Source Tools for Your Security TeamDark Web Forum Activity Surged 44% in Early COVID MonthsChina's APT Groups May Be Looking to Cash InSolarWinds Hit With Class-Action Lawsuit Following Orion BreachFBI, CISA, NSA & ODNI Cite Russia in Joint Statement on 'Serious' SolarWinds AttacksThe Road to XDRWhat You Need to Know About California's New Privacy RulesMicrosoft Source Code Exposed: What We Know & What It MeansNetwrix and Stealthbits Merge to Tackle Data SecurityT-Mobile Hacked — AgainCOVID-19's Acceleration of Cloud Migration & Identity-Centric SecurityCISO New Year's Resolutions for 2021Microsoft Reveals That Russian Attackers Accessed Some of Its Source Code4 Ways to Help Your Family Combat Cyber Threats in the New YearHow to Build Cyber Resilience in a Dangerous AtmosphereThe Coolest Hacks of 202020 for 2020: The Edge's Top Articles of the YearMobile Endpoint Security: Still the Crack in the Enterprise's Cyber ArmorDDoS Attacks Spiked, Became More Complex in 2020Bring on 2021!Reducing the Risk of Third-Party SaaS Apps to Your OrganizationIndia: A Growing Cybersecurity ThreatMac Attackers Remain Focused Mainly on Adware, Fooling UsersSecurity Pros Reflect on 2020Defending the COVID-19 Vaccine Supply Chain10 Benefits of Running Cybersecurity ExercisesRemote Desktop Bugs: Patches That Took Priority in a Pandemic YearHomomorphic Encryption: The 'Golden Age' of CryptographyLooking Ahead to 2021: The Things We’ll Carry ForwardAmazon Gift Card Scam Delivers Dridex This Holiday SeasonQuarterbacking Vulnerability RemediationHelpSystems Acquires Data Security Firm VeraDelivering Santa from Third-Party RiskCartoon: The Message Is Loud and ClearWhy SolarWinds-SUNBURST is our Cyber Pearl HarborWhy SolarWinds-SUNBURST is a Wake up CallMcAfee Security Innovation Alliance 2020 MPOWER AwardsMicrosoft, McAfee, Rapid7, and Others Form New Ransomware Task ForceWhite Ops Announces Its AcquisitionLazarus Group Seeks Intelligence Related to COVID-192020 In Review: The Top 10 Most Popular Life at McAfee BlogsEnterprise IoT Security Is a Supply Chain ProblemSolarWinds Campaign Focuses Attention on 'Golden SAML' Attack VectorMicrosoft Ups Security of Azure AD, IdentityEmotet Campaign Restarts After Seven-Week HiatusTest5 Email Threat Predictions for 2021Prepare to Fight Upcoming Cyber-Threat InnovationsLaw Enforcement Disrupts VPN Services Enabling CybercrimeSecurity as Code: How Repeatable Policy-Driven Deployment Improves SecurityST25: Absicherung von Cloud-nativen AnwendungenCisco, Intel, Deloitte Among Victims of SolarWinds Breach: ReportHow A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain CompromiseNSA, CISA Warn of Attacks on Federated Authentication7 Infamous Moments in Adobe Flash's Security HistoryFinally, True Unified Multi-Vector Data Protection in a Cloud WorldMcAfee MVISION for Endpoint is FedRAMP Moderate As Federal Cloud Usage Continues to RiseThe Hidden Costs of Cybercrime on GovernmentWe Have a National Cybersecurity Emergency — Here's How We Can RespondMicrosoft Confirms Its Network Was Breached With Tainted SolarWinds UpdatesFBI Warns of DoppelPaymer Attacks on Critical InfrastructureBest Smart Home Devices for a Connected New Year5 Key Takeaways from the SolarWinds Breach2021 Cybersecurity Predictions: The Intergalactic Battle BeginsFinding the Success Among the Pandemonium that is 2020Malicious Browser Extensions for Social Media Infect Millions of SystemsAdditional Analysis into the SUNBURST Backdoor'SocGholish' Attack Framework Powers Surge in Drive-By AttacksXDR 101: What's the Big Deal About Extended Detection & Response?CISA: SolarWinds Not the Only Initial Attack Vector in Massive BreachRising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond51% of WFH Parents Say Children Have Accessed Work Accounts3 Reasons Why Connected Apps are Critical to Enterprise SecurityVPNs, MFA & the Realities of Remote WorkFireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to RespondAttackers Leverage IMAP to Infiltrate Email AccountsNew IRS Form Fraud Campaign Targets G Suite UsersUS-CERT Reports 17,447 Vulnerabilities Recorded in 2020Corporate Credentials for Sale on the Dark Web: How to Protect Employees and DataWhy the Weakest Links MatterSenior Managers Twice as Likely to Share Work Devices With OutsidersAdrozek Malware is Wreaking Havoc on Web Browsers: How to Stay ProtectedSUNBURST Malware and SolarWinds Supply Chain CompromisePatching Still Poses Problems for Industrial Controllers, Networking DevicesWhy Secure Email Gateways Rewrite Links (and Why They Shouldn't)SSO and MFA Are Only Half Your Identity Governance StrategyConcerns Run High as More Details of SolarWinds Hack EmergeTwitter Fined in Irish GDPR ActionMedical Imaging Leaks Highlight Unhealthy Security Practices45M Medical Imaging Files Left Accessible OnlineNowhere to Hide: Don't Let Your Guard Down This Holiday SeasonHow OCA Empowers Your XDR JourneyThe Private Sector Needs a Cybersecurity Transformation18,000 Organizations Possibly Compromised in Massive Supply-Chain Cyberattack2021 Security Budgets: Top Priorities, New RealitiesRansomware ResponseStartups Should Do Things That Don't Scale, but Security Isn't One of ThemFBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance LearningMicrosoft Warns of Powerful New Adware7 Security Tips For Gamers'Tis the Season to Confront Third-Party RiskPenetration Testing: A Road Map for Improving OutcomesKnowing What the Enemy Knows Is Key to Proper DefenseTop Ten Tips for Protecting Your Identity, Finances, and Security OnlineJuvenile Pleads Guilty to 2016 DNS AttackContact-Tracing Apps Still Expose Users to Security, Privacy Issues'Fingerprint-Jacking' Attack Technique Manipulates Android UIFireEye Breach Fallout Yet to Be FeltCloud Identity and Access Management: Understanding the Chain of Access10 Reasons to Celebrate 202051% of Edge Readers Plan to Pursue New Cybersecurity Certification in 2021Poll: Endpoint Agita85,000 MySQL Servers Hit in Active Ransomware CampaignThe Line Between Physical Security & Cybersecurity Blurs as World Gets More DigitalGoogle Shares Cloud Security TipsResearcher Developed New Kernel-Level Exploits for Old Vulns in WindowsRansomware Makes Up Half of All Major IncidentsSecurity Incidents Are 'Tip of the Iceberg,' Says UK Security Official10 Ways Device Identifiers Can Spot a CybercriminalVulnerabilities Continue Around 2019 PaceFormer Microsoft Cloud Security Leads Unveil New StartupThe Holiday Shopping Season: A Prime Opportunity for Triangulation FraudSecuring Containers with NIST 800-190 and MVISION CNAPPNavigating the Security Maze in a New Era of CyberthreatsBlack Hat Europe: Dark Reading Video News Desk CoverageGlobal Cybercrime Losses Cross $1 Trillion MarkOpen-Source Developers Still Not Interested in Secure CodingNation-State Hackers Breached FireEye, Stole Its Red Team ToolsMicrosoft Fixes 58 CVEs for December Patch TuesdayDragos Nets $110M in Series C Led by Major Global Energy, Manufacturing, Oil & Gas Company InvestorsGula Tech Foundation to Award $1M in Grants to Infosec NonprofitsWhy Compliance Is No Longer King for Financial Services CybersecurityFortinet Purchases PanoptaKeeping Cyber Secure at ChristmasEnergy Company Fights Back with MVISION EDR as Covid-19 Increases Threat CampaignsAttackers Know Microsoft 365 Better Than You DoPhishing Campaign Targets 200M Microsoft 365 AccountsTrump Signs IoT Security Bill into LawThe Magic Behind the MagicNSA Warns of Exploits Targeting Recently Disclosed VMware VulnerabilityNortonLifeLock Acquires Avira for $360MAs DNA Synthesis Evolves, Cyber-Physical Attack Worries GrowChart: Cyberthreats Follow Workers HomeName That Toon: Winter ForecastAvoiding a 1984-Like Future5 Creative Ways to Virtually Connect with Loved Ones This HolidayMicrosoft Cloud Security Exec Talks New Tech, WFH, GamificationKmart Hit by Egregor RansomwareBECs and EACs: What's the Difference?2020 Hindsight – Top 10 Highlights from McAfeeIntel Doubles Down on Emerging Technologies for Sharing and Using Data SecurelyFlash Dies but Warning Signs Persist: A Eulogy for Tech's Terrible Security PrecedentAssessing Cybersecurity Risk in Today's EnterprisesPotential Nation-State Actor Targets COVID-19 Vaccine Supply ChainTrickBot's New Tactic Threatens FirmwareCommon Container Manager Is Vulnerable to Dangerous ExploitCloud Security Threats for 2021US Officials Take Action Against 2,300 Money MulesResearchers Bypass Next-Generation Endpoint ProtectionFrom FUD to Fix: Why the CISO-Vendor Partnership Needs to Change NowGoogle Security Researcher Develops 'Zero-Click' Exploit for iOS FlawOpen Source Flaws Take Years to Find But Are Quick to FixOpen Source Flaws Take Years to Find But Just a Month to FixCybersecurity in the Biden Administration: Experts Weigh InResearchers Discover New Obfuscation-As-a-Service PlatformFBI: BEC Scammers Could Abuse Email Auto-ForwardingLoyal Employee … or Cybercriminal Accomplice?Automated Pen Testing: Can It Replace Humans?Security Slipup Exposes Health Records & Lab ResultsWhy I'd Take Good IT Hygiene Over Security's Latest Silver BulletFree Mobile App Measures Your Personal Cyber RiskUnmanaged Devices Heighten Risks for School NetworksInside North Korea's Rapid Evolution to Cyber SuperpowerMalicious or Vulnerable Docker Images Widespread, Firm SaysSASE 101: Why All the Buzz?The Cybersecurity Skills Gap: It Doesn't Have to Be This WayTop Phishing Lures to Look Out for This Holiday SeasonCall Fraud Operator Ordered to Pay $9M to VictimsPutting Protection to The TestIvanti Acquires MobileIron & Pulse SecureThink Beyond the Edge: Why SASE is Incomplete Without Endpoint DLPSophos 2021 Threat Report: Navigating Cybersecurity in an Uncertain WorldCan't Afford a Full-time CISO? Try the Virtual VersionFormer NSS Labs CEO Launches New Security Testing Organization2020 Cybersecurity Holiday Gift Guide for KidsDriven by Ransomware, Cyber Claims Rise in Number & ValueManchester United Cyberattack Highlights Controversy in Paying Ransomware AttackersBaltimore County Public Schools Closed Due to Ransomware AttackIndustrial Computer Maker Confirms Ransomware, Data TheftWhy Vulnerable Code Is Shipped KnowinglyTest5 Signs Someone Might be Taking Advantage of Your Security GoodnessFailing Toward Zero: Why Your Security Needs to Fail to Get BetterDo You Know Who's Lurking in Your Cloud Environment?Look Beyond the 'Big 5' in CyberattacksPrevention Is Better Than the Cure When Securing Cloud-Native DeploymentsWhy Security Awareness Training Should Be Backed by Security by DesignLatest Version of TrickBot Employs Clever New Obfuscation TrickBaidu Apps Leaked Location Data, Machine Learning RevealsHow Ransomware Defense is Evolving With Ransomware AttacksCISA Warns of Holiday Online Shopping ScamsAlexa, Disarm the Victim's Home Security SystemCloud Security Startup Lightspin Emerges From StealthUS Treasury's OFAC Ransomware Advisory: Navigating the Gray AreasWhat's in Store for Privacy in 2021Printers' Cybersecurity Threats Too Often IgnoredSecurity Researchers Sound Alarm on Smart DoorbellsAs 'Anywhere Work' Evolves, Security Will Be Key ChallengeRansomware Grows Easier to Spread, Harder to BlockEvidence-Based Trust Gets Black Hat Europe Spotlight70,000 Phishing Emails Sent Impersonating the IRS: How to Stay ProtectedManchester United Suffers CyberattackChinese APT Group Returns to Target Catholic Church & Diplomatic GroupsZooming with the Grandkids: Five Easy Video Chat Apps for the Holidays3 Steps CISOs Can Take to Convey Strategy for Budget PresentationsHow Retailers Can Fight Fraud and Abuse This Holiday SeasonSecOps & DevOps collaboration10 Undergraduate Security Degree Programs to ExploreMcAfee Team Members Share Their Virtual Onboarding ExperiencesFacebook Messenger Flaw Enabled Spying on Android CalleesHow Industrial IoT Security Can Catch Up With OT/IT ConvergenceSecurity Pros Push for More Pervasive Threat ModelingHow Cyberattacks WorkTelos Goes PublicISP Security: Do We Expect Too Much?Iowa Hospital Alerts 60K Individuals Affected by June Data BreachCybercriminals Get Creative With Google Services5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday Go SMS Pro Messaging App Exposed Users' Private Media FilesThe Yellow Brick Road to Risk ManagementFree VPNs May Still Come with a PriceNew Proposed DNS Security Features Released2021 Cybersecurity Spending: How to Maximize ValueUnpatched Browsers Abound, Study ShowsOnline Shopping Surge Puts Focus on Consumer Security HabitsCisco Webex Vulns Let 'Ghost' Attendees Spy on MeetingsOut With the Old Perimeter, in With the New PerimetersTrump Fires CISA Director Chris KrebsAs Businesses Move to Multicloud Approach, Ransomware FollowsWhat Truebill and Other Financial Apps Have in Common With EDRHow to Identify Cobalt Strike on Your NetworkResearchers Say They've Developed Fastest Open Source IDS/IPSNearly Two Dozen AWS APIs Are Vulnerable to AbuseEFF, Security Experts Condemn Politicization of Election SecurityVulnerability Prioritization Tops Security Pros' ChallengesResearchers Scan for Supply-Side Threats in Open SourceTo Pay or Not to Pay: Responding to Ransomware From a Lawyer's PerspectiveChart: Undisputed Increase in Paid ClaimsMcAfee MVISION Solutions Meet FedRAMP Cloud Security RequirementsSecurity Risks Discovered in Tesla Backup GatewayAn Inside Look at an Account TakeoverRansomware Operator Promotes Distributed Storage for Stolen DataChristmas Shopping 2020‘Sleigh’ Holiday Shopping by Protecting Your Online SecurityCyber Monday is Coming – 10 Tips to Protect You From Online Shopping ScamsBreakdown of a Break-in: A Manufacturer's Ransomware ResponseGlobal Pandemic Fuels Cyber-Threat Workload for National Cyber Security Centre, Shows Annual ReviewTwitter Taps MudgeZoom Debuts New Tools to Fight Meeting DisruptionsA Call for Change in Physical SecurityApple Issues Security UpdatesHow to Prevent Keyboard Snooping Attacks on Video CallsCISA Director Expects to Be Fired Following Secure ElectionSelf-Service Security for Developers Is the DevSecOps Brass RingThe Sameness of Every Day: How to Change Up Audit FatigueA Hacker's Holiday: How Retailers Can Avoid Black Friday Cyber ThreatsManufacturing Sees Rising Ransomware Threat'Pay2Key' Could Become Next Big Ransomware ThreatCredential Stuffing Fills E-commerce Pipeline in 2020SOCwise: A Security Operation Center (SOC) Resource to BookmarkNew 'CostaRicto' Hack-for-Hire Group Targets Global BusinessesDARPA and Academia Jumpstart 5G IoT Security EffortsBridge the Gap Between the Security You Have and the Security You NeedThankful for broadband internet, and hopeful for much more  Are You Prepared for Cybersecurity in the Boardroom?Home-Point Cybersecurity: Bring Your Enterprise Home5 Steps Every Company Should Take to Avoid Data Theft RiskLike the Energizer Bunny, Trickbot Goes On and OnWe Secured the Election. Now How Do We Secure Trust in Results?NSF-Funded Research Aims to Help Disrupt Cybercrime Supply ChainsWant to Avoid an Extreme Cyberloss? Focus on the BasicsSecurity Hiring Plans Remain Constant Despite Pandemic3 Tips For Successfully Running Tech Outside the IT DepartmentBarracuda to Acquire Fyde for Zero-Trust Capabilities7 Cool Cyberattack and Audit Tools to be Highlighted at Black Hat Europe9 New Tactics to Spread Security AwarenessFormer Microsoft Software Engineer Sentenced to 9 Years in PrisonHow to Avoid Getting Killed by RansomwareFlaws in Privileged Management Apps Expose Machines to AttackMalware Hidden in Encrypted Traffic Surges Amid PandemicClaroty Details Vulnerabilities in Schneider PLCsMicrosoft Patches Windows Kernel Flaw Under Active AttackCloud Usage, Biometrics Surge As Remote Work Grows PermanentOverlooked Security Risks of the M&A ReboundCVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows ServerHonoring Our Brave Military Veterans from the McAfee CommunityThe Double-Edged Sword of Cybersecurity InsuranceHow CASB and EDR Protect Federal Agencies in the Age of Work from HomeHow Hackers Blend Attack Methods to Bypass MFAWhat You Need to Know About Among UsNew Brazilian Banking Trojan Targets Mobile Users in Multiple CountriesFTC Announces Consent Agreement With ZoomHotels.com & Expedia Provider Exposes Millions of Guests' DataData Privacy Gets Solid Upgrade With Early AdoptersInsecure APIs a Growing Risk for OrganizationsUnravel the XDR Noise and Recognize a Proactive ApproachPreventing and Mitigating DDoS Attacks: It's Elementary7 Online Shopping Tips for the HolidaysHelping Your Family Combat Digital MisinformationNew Gitpaste-12 Botnet Exploits 12 Known VulnerabilitiesApple Patches 24 Vulnerabilities Across Product LinesThe Oracle-Walmart-TikTok Deal Is Not EnoughName That Toon: Masks and MannersHow COVID-19 Changed the VC Investment Landscape for Cybersecurity CompaniesUS Seizes 27 More IRGC-Controlled Domain NamesNSS Labs' Abrupt Shutdown Leaves Many Unanswered QuestionsBug Bounty Hunters' Pro Tips on Chasing Vulns & MoneyDigital Transformation Means Security Must Also TransformCado Security Gets $1.5 Million SeedOne Team Member Selflessly Provides Relief to COVID-19’s Front LineOnline Users Feel Safe, But Risky Behavior AboundsOperation North Star: Behind The ScenesOperation North Star: Summary Of Our Latest AnalysisMcAfee Labs Report Reveals Continuing Surge of COVID-19 Threats and MalwareThe One Critical Element to Hardening Your Employees' Mobile SecurityRansom Payment No Guarantee Against DoxxingDisinformation Now the Top Concern Following Hack-Free Election DayHexagon Announces Deal to Acquire PAS GlobalPrepare for the Unexpected: Costs to Consider in Security BudgetsContainers for Data Analysis Are Rife With VulnerabilitiesCSA Moves to Redefine Cloud-Based IntelligenceSecuring the 2020 Election: 'We're Not Out of the Woods Yet'APT Groups Get Innovative — and More Dangerous — in Q3SPOTLIGHT: Women in CybersecurityNeustar Agrees to Buy Verisign's Public DNS ServiceCybercrime: Nation-States Go Prime TimeOracle Issues Out-of-Band Update for Remote-Access Vulnerability9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone TimeReworking the Taxonomy for Richer Risk Assessments6 Cybersecurity Lessons From 2020California's Prop. 24 Splits Privacy AdvocatesMicrosoft & Others Catalog Threats to Machine Learning SystemsNew Tools Make North Korea's Kimsuky Group More DangerousRussian National Sentenced to 8 Years in Prison for Role in Botnet OperationWindows Zero-Day Used with Chrome Flaw in Targeted AttacksFraud Prevention Strategies to Prepare for the FutureHow Can I Help Remote Workers Secure Their Home Routers?As Businesses Go Remote, Hackers Find New Security GapsRising Ransomware Breaches Underscore Cybersecurity FailuresNew Wroba Campaign Is Latest Sign of Growing Mobile ThreatsMcAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASBJavaScript Obfuscation Moves to Phishing EmailsMicrosoft Warns of Ongoing Attacks Exploiting ZerologonPublic Safety & Cybersecurity Concerns Elevate Need for a Converged ApproachSANS Launches New CyberStart Program for All High School StudentsFirst the Good News: Number of Breaches Down 51% Year Over YearMcAfee Launches XDR, Browser Isolation, Cloud App Security ToolsHackers Make Off With Millions From Wisconsin RepublicansRansomware Wave Targets US Hospitals: What We Know So FarHow Healthcare Organizations Can Combat RansomwareWhy Defense, Not Offense, Will Determine Global Cyber PowersCybercriminals Aim BEC Attacks at Education IndustryCatch the Most Sophisticated Attacks Without Slowing Down Your UsersWith No Power Comes More ResponsibilityAnalysis: Forcepoint Can Still Succeed, But it Needs Committed Ownership'Act of War' Clause Could Nix Cyber Insurance PayoutsIs Your Encryption Ready for Quantum Threats?Breaking the Glass Ceiling: Tough for Women, Tougher for Women of ColorUS Government Issues Warning on Kimsuky APT Group6 Ways Passwords Fail Basic Security TestsRethinking Security for the Next Normal — Under PressureTrump Campaign Website Defaced by Unknown AttackersTracking Down the Web TrackersHow to Increase Voter Turnout & Reduce FraudPhysical Security Has a Lot of Catching Up to DoSurvey Uncovers High Level of Concern Over FirewallsChinese Attackers' Favorite Flaws Prove Global Threats, Research ShowsElection 2020: Lookout for Fake News Before and After the ElectionMITRE Shield Matrix Highlights Deception & Concealment TechnologyPoll: Always LearningAkamai Acquires AsavieDevelopers' Approach to App Testing Could Cut Flaw Fix Times by 80 DaysEmployees Aware of Emailed Threats Open Suspicious Messages5 Human Factors That Affect Secure Software DevelopmentNeural Networks Help Users Pick More-Secure PasswordsCybercriminals Extort Psychotherapy Patients Following Vastaamo BreachSpotlighting McAfee’s Women in Technology Scholarship RecipientsNew Report Links Cybersecurity and SustainabilityTeach Your Employees Well: How to Spot Smishing & Vishing ScamsCruel Ghouls: New Digital Scams Target Every Age GroupMicrosoft's Kubernetes Threat Matrix: Here's What's MissingThe Story of McAfee: How the Security Giant Arrived at a Second IPOTrick or Treat: Avoid These Spooky Threats This HalloweenUS Treasury Sanctions Russian Institution Linked to Triton MalwareCybercriminals Could be Coming After Your CoffeeFlurry of Warnings Highlight Cyber Threats to US ElectionsA Pause to Address 'Ethical Debt' of Facial RecognitionBotnet Infects Hundreds of Thousands of Websites7 Mobile Browsers Vulnerable to Address-Bar SpoofingCredential-Stuffing Attacks Plague Loyalty ProgramsWordPress Plug-in Updated in Rare Forced Action8 New and Hot Cybersecurity Certifications for 2020To Err Is Human: Misconfigurations & Employee Neglect Are a Fact of LifeMcAfee Raises $740M in Second IPOAffected by a Data Breach? Here Are Five Security Steps You Should TakeNeed for 'Guardrails' in Cloud-Native Applications IntensifiesImplementing Proactive Cyber Controls in OT: Myths vs. RealityFIRST Announces Cyber-Response Ethical GuidelinesOracle Releases Another Mammoth Security Patch UpdateUbiq Rolls Out Encryption-as-a-Service Platform Aimed at DevelopersAs Smartphones Become a Hot Target, Can Mobile EDR Help?Dealing With Insider Threats in the Age of COVIDHow AI Will Supercharge Spear-PhishingIASME Consortium to Kick-start New IoT Assessment SchemeAre You One COVID-19 Test Away From a Cybersecurity Disaster?Iranian Cyberattack Group Deploys New PowGoop Downloader Against Mideast TargetsModern Day Insider Threat: Network Bugs That Are Stealing Your DataElection 2020: Make Sure Your Voice is Heard with These Tips5G and the IoT: A Look Ahead at What’s Next for Your Home and CommunityRansomware Attacks Show Little Sign of Slowing in 2021Do Standards Exist That Certify Secure IoT Systems?NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State HackersThe Cybersecurity Maturity Model Certification: Are You in Compliance?Farsight Labs Launched as Security Collaboration PlatformData-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?Businesses Rethink Endpoint Security for 2021Building the Human FirewallTrickbot Tenacity Shows Infrastructure Resistant to TakedownsNSS Labs ShutteredRussian Military Officers Unmasked, Indicted for High-Profile Cyberattack CampaignsGravityRAT Spyware Targets Android & MacOS in IndiaIoT Vulnerability Disclosure Platform LaunchedMicrosoft Tops Q3 List of Most-Impersonated BrandsTrickbot, Phishing, Ransomware & Elections7 Tips for Choosing Security Metrics That MatterChart: The Pandemic Reprioritizes Security ProjectsA Swift Reminder About CybersecurityExpert Tips to Keep WordPress SafeA New Risk Vector: The Enterprise of ThingsSeven Tips for Protecting Your Internet-Connected Healthcare DevicesMassive New Phishing Campaigns Target Microsoft, Google Cloud UsersUS Counterintelligence Director & Fmr. Europol Leader Talk Election SecurityAn Uncommon 20 Years of Commonly Enumerating VulnsAcademia Adopts Mitre ATT&CK FrameworkCybercrime Losses Up 50%, Exceeding $1.8BProlific Cybercrime Group Now Focused on RansomwareUS Indicts Members of Transnational Money-Laundering OrganizationTwitter Hack Analysis Drives Calls for Greater Security RegulationBarnes & Noble Warns Customers About Data BreachOvercoming the Challenge of Shorter Certificate LifespansThe Ruthless Cyber Chaos of Business RecoveryMicrosoft Office 365 Accounts a Big Target for AttackersZoom Announces Rollout of End-to-End EncryptionLondon Borough of Hackney Investigates 'Serious' CyberattackWhat's Really Happening in Infosec Hiring Now?Assuring Business Continuity by Reducing Malware Dwell TimeIntel's Ice Lake Beefs Up CPU Security for Cloud WorkloadsNIST Quantum Cryptography Program Nears CompletionThe Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AIElection 2020 – How to Spot Phony Deepfake Videos this ElectionMicrosoft Fixes Critical Windows TCP/IP Flaw in Patch RolloutCoalition Pokes Five Eyes on Call for BackdoorsPhishing in Troubled Waters: 3 Ways Email Attacks May Impact ElectionsTreasury Dept. Advisory Shines Spotlight on Ransomware Negotiators25% of BEC Cybercriminals Based in the USWhere are the 'Great Exits' in the Data Security Market?CVE-2020-16898: “Bad Neighbor”“Best of Breed” – CASB/DLP and Rights Management Come TogetherMicrosoft Teams – Top Ten Security ThreatsReady, Set, Shop: Enjoy Amazon Prime Day Without the Phishing ScamsTrickbot Botnet Response Highlights Partnerships Preventing U.S. Election InterferenceFedRAMP – What’s the Big Deal?Online Voting Is Coming, but How Secure Will It Be?Software AG Continues Efforts Against $20M Ransomware AttackSecurity Firms & Financial Group Team Up to Take Down TrickbotWhat is End-to-End Encryption?Security Officers, Are Your Employees Practicing Good Habits from Home?Security Officers, Are Your Employers Practicing Good Habits from Home?A 7-Step Cybersecurity Plan for Healthcare OrganizationsHow to Pinpoint Rogue IoT Devices on Your NetworkStay Connected and Protected During Work, School, and PlaySecurity and DevOpsHow To Spot Tech Support Scams#BeCyberSmart: Equipping Kids to Stay Safe on New Video AppsST24: Proaktive Absicherung zur Minimierung von Endgeräterisiken (German)Latest Version of MalLocker Android Ransomware Packs New TricksApple Pays Bug Bounty to Enterprise Network ResearchersCritical Zerologon Flaw Exploited in TA505 AttacksCISOs Planning on Bigger Budgets: ReportWhy MSPs Are Hacker Targets, and What To Do About ItEmotet 101: How the Ransomware Works — and Why It's So Darn EffectiveCyberattacks Up, But Companies (Mostly) Succeed in Securing Remote WorkforceScale Up Threat Hunting to Skill Up AnalystsUS Seizes Domain Names Used in Iranian Disinformation CampaignElection 2020 – Fake Election Websites: Five Tips So You Don’t Get FooledUS Election-Related Websites Vulnerable to Fraud, AbuseKaspersky Researchers Spot Russia-on-Russia Cyber-Espionage CampaignKey Considerations & Best Practices for Establishing a Secure Remote WorkforceElection 2020 – Keep Misinformation from Undermining the VoteUS County Election Websites (Still) Fail to Fulfill Basic Security Measures'Bahamut' Threat Group Targets Government & Industry in Middle EastNew 'HEH' Botnet Targets Exposed Telnet ServicesOpen Source Threat Intelligence Searches for Sustainable CommunitiesRare Firmware Rootkit Discovered Targeting Diplomats, NGOs3 Ways Companies are Working on Security by DesignCyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare ThreatsCISA Warns of Renewed Emotet ActivityThe New War Room: Cybersecurity in the Modern EraWhat the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization SecurityVerizon Payment Security Report is a Wake-up Call: Time to Refocus on PCI DSS ComplianceZerologon Vulnerability Used in APT AttacksHow Netflix Makes Security Decisions: A Peek Inside the ProcessNew Research Finds Bugs in Every Anti-Malware Product TestedCelebrating multi-national cultures this Hispanic Heritage MonthGoogle Brings Password Protection to iOS, Android in Chrome 8610 Years Since Stuxnet: Is Your Operational Technology Safe?Our Experiences Participating in Microsoft’s Azure Sphere Bounty ProgramRethinking Email Security in the Face of FearwareMalware for Ad Fraud Gets More Sophisticated6 Best Practices for Using Open Source Software SafelyDo’s and Don’ts for School Cybersecurity AwarenessCristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 ListHow Searching For Your Favourite Celebrity May Not End WellMITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTCAnna Kendrick Is McAfee’s Most Dangerous Celebrity 2020Check Out the McAfee Most Dangerous Celebrity 2020Most Dangerous Celebrity 2020 SweepstakesJohn McAfee Indicted on Tax ChargesMeet ‘Egregor,’ a New Ransomware Family to WatchAndroid Camera Bug Under the Microscope‘Virtual Cyber Carnival’ Kicks off Cybersecurity Awareness MonthCybersecurity Awareness Month: If You Connect It, Protect It3 Ways Data Breaches Accelerate the Fraud Supply Chaintest chunk serverResearchers Adapt AI With Aim to Identify Anonymous AuthorsBiometric Data Collection Demands Scrutiny of Privacy Law‘Father of Identity Theft’ Sentenced to 207 MonthsEmotet Spoofs DNC In New Attack CampaignName That Toon: Castle in the SkyConvenience vs. Online Security: Have Your Cake and Eat It Too3 Months for the Cybercrime BooksTruncated URLs Look to Make Big Dent in PhishingSingapore Asks Big Cybersecurity Questions to Improve National DefenseNew HP Bug Bounty Program Targets Vulns in Printer CartridgesUS Treasury Warns of Sanctions Violations for Paying Ransomware AttackersCFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec ProsImperva Agrees to Buy jSonarMcAfee Leapfrogs Competition with trio of awards at 2020 IT World Awards‘It Won’t Happen to Me’: Employee Apathy Prevails Despite Greater Cybersecurity AwarenessST23: Moderner Datenschutz für Microsoft Teams (German)Russian National Sentenced to 7+ Years for Hacking US Tech FirmsCryptojacking: The Unseen ThreatRise in Remote MacOS Workers Driving Cybersecurity ‘Rethink’Securing Space 4.0 – One Small Step or a Giant Leap? Part 1Securing Space 4.0 – One Small Step or a Giant Leap? Part 2The No Good, Very Bad Week for Iran’s Nation-State Hacking OpsGitHub Tool Spots Security Vulnerabilities in CodeCloud Misconfiguration Mishaps Businesses Must WatchWhat Legal Language Should I Be Aware of When Choosing Cyber Insurance?A Guide to the NIST Cybersecurity FrameworkIDaaS: A New Era of Cloud IdentityCOVID-19 Creates Opening for OT Security ReformPhishing Attack Targets Microsoft 365 Users With Netflix & Amazon LuresAttacker Dwell Time: Ransomware’s Most Important MetricMicrosoft: Ransomware & Nation-State Attacks Rise, Get More SophisticatedDDoS Attacks Soar in First Half of 2020New Campaign by China-Linked Group Targets US Orgs for First TimeSecuring Slack: 5 Tips for Safer Messaging, CollaborationVulnerability in Wireless Router Chipsets Prompts AdvisoryShifting Left of Left: Why Secure Code Isn’t Always Quality CodeState-Sponsored Hacking Groups Increasingly Use Cloud & Open Source InfrastructureThe Shared Irresponsibility Model in the Cloud Is Putting You at RiskElection 2020 – Five Tips to Secure a Mail-In Ballot That CountsIvanti Acquires Two Security CompaniesUniversal Health Services Network Down in Apparent Ransomware AttackCybersecurity Awareness Month Helps Us All be #BeCyberSmart9 Tips to Prepare for the Future of Cloud & Network SecuritySafeguarding Schools Against RDP-Based RansomwareMFA-Minded Attackers Continue to Figure Out Workarounds8 Ways to Help Senior Adults Stay Safe Online These Days6 Things to Know About the Microsoft ‘Zerologon’ FlawNavigating the Asia-Pacific Threat Landscape: Experts Dive InGetting Over the Security-to-Business Communication Gap in DevSecOpsRASP 101: Staying Safe With Runtime Application Self-ProtectionWannaCry Has IoT in Its CrosshairsMalware Attacks Declined But Became More Evasive in Q2Bluetooth Security Weaknesses Pile Up, While Patching Remains ProblematicCritical Instagram Flaw Could Let Attackers Spy on VictimsStay Connected & Protected: Weaving Security Into Our Social Media HabitsSolving the Problem With Security StandardsCrowdStrike Agrees to Acquire Preemptive Security for $96MCrowdStrike Agrees to Acquire Preempt Security for $96MMicrosoft Warns of Attackers Now Exploiting ‘Zerologon’ FlawSince Remote Work Isn’t Going Away, Security Should Be the FocusGaming Industry Hit With 10B+ Attacks In Past Two YearsShopify’s Employee Data Theft Underscores Risk of Rogue InsidersGoogle Cloud Debuts Threat-Detection ServiceCareer change? Cybersecurity companies are hiring.India’s Cybercrime and APT Operations on the RiseST22: Attivo Networks with Greg Vinson & Tushar KothariMicrosoft’s Azure Defender for IoT Uses CyberX TechMy Journey Toward SAP SecurityMVISION Cloud for Microsoft TeamsU.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your VoteMaking the Case for Medical Device CybersecurityFBI, DHS Warn of ‘Likely’ Disinformation Campaigns About Election Results7 Non-Technical Skills Threat Analysts Should Master to Keep Their Jobs12 Bare-Minimum Benchmarks for AppSec InitiativesAttackers Target Small Manufacturing FirmsVulnerability Disclosure Programs See Signups & Payouts SurgeNew Google Search Hacks Push Viruses & PornStartup Aims to Map and Track All the IT and Security ThingsCan Schools Pass Their Biggest Cybersecurity Test Yet?Microsoft Extends Data Loss Prevention to Cloud App SecurityPermission Management & the Goldilocks ConundrumNearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of WorkRemote Work Exacerbating Data Sprawl‘Dark Overlord’ Cyber Extortionist Pleads GuiltySpecial Delivery: Don’t Fall for the USPS SMiShing ScamPatch by Tonight: CISA Issues Emergency Directive for Critical Netlogon Flaw5 Steps to Greater Cyber ResiliencyHacking Yourself: Marie Moe and Pacemaker SecurityA Hacker’s PlaylistDeadly Ransomware Story Continues to UnfoldDeepfake Detection Poses Problematic Technology RaceMitigating Cyber-Risk While We’re (Still) Working from HomeThe smart home revolutionVideo surveillance & analyticsDefending Against Deepfakes: From Tells to CryptoDon’t Fall for It! Defending Against DeepfakesIndictments Unlikely to Deter China’s APT41 ActivityIranian Hackers Indicted for Stealing Aerospace & Satellite Tracking DataRansomware Gone Awry Has Fatal ConsequencesSumo Logic IPO Prices Higher Than ExpectedTime for CEOs to Stop Enabling China’s Blatant IP TheftBlack Hat EuropeStruggling to Secure Remote IT? 3 Lessons from the OfficeWhat’s on Your Enterprise Network? You Might be SurprisedLikely Links Emerge Between Lazarus Group and Russian-Speaking CybercriminalsDDoS Attacks Rose 151% in First Half of 2020h2c Smuggling: A New ‘Devastating’ Kind of HTTP Request Smugglingh2c Smuggling: A New ‘Devastating’ Kind of HTTP RequestMost Organizations Plan to Make COVID-19 Changes PermanentUS Charges Five Members of China-Linked APT41 for Global Attacks8 Reasons Perimeter Security Alone Won’t Protect Your Crown JewelsCISA Joins MITRE to Issue Vulnerability IdentifiersMeet the Computer Scientist Who Helped Push for Paper BallotsCybersecurity Bounces Back, but Talent Still AbsentHow IT Security Organizations are Attacking the Cybersecurity ProblemRethinking Resilience: Tips for Your Disaster Recovery PlanThermal vision solutionsMore Cyberattacks in the First Half of 2020 Than in All of 20195 Security Lessons Humans Can Learn From Their DogsCISA Issues Alert for Microsoft Netlogon VulnerabilityTaking Security With You in the WFH Era: What to Do NextEvolving Security Products for the new Realities of Living Life From HomeResearch Finds Nearly 800,000 Access Keys Exposed OnlineEncrypted Traffic Inference: An Alternative to Enterprise Network Traffic DecryptionPhishing Email Examples: How to Recognize a Phishing EmailSimplify Your Privacy Approach to Overcome CCPA ChallengesResearchers, Companies Slam Mobile Voting Firm Voatz for ‘Bad Faith’ AttacksLarge Cloud Providers Much Less Likely Than Enterprises to Get BreachedE-Commerce Sites Hit With New Attack on MagentoSecurity Through an Economics Lens: A Guide for CISOsVirginia’s Largest School System Hit With RansomwareOpen Source Security’s Top Threat and What To Do About ItMore Printers Could Mean Security Problems for Home-Bound WorkersA Real-World Tool for Organizing, Integrating Your Other Tools3 Secure Moments: A Tranquil Trio of Security HaikuAPT Groups Set Sights on Linux Targets: Inside the TrendRansomware Hits US District Court in LouisianaSpear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real TimeFraud Prevention During the PandemicCyber-Risks Explode With Move to Telehealth ServicesUS Sanctions Russian Attackers for 2020 Election Interference6 Lessons IT Security Can Learn From DevOpsTwo Years on from GDPR: Has It Driven Growth in Cybersecurity Insurance?ThreatConnect Buys Nehemiah SecurityZoom Brings Two-Factor Authentication to All UsersThink You’re Spending Enough on Security?Managed IT Providers: The Cyber-Threat Actors’ Gateway to SMBsSpot Fake News and Misinformation in Your Social Media FeedRipple20 Malware Highlights Industrial Security ChallengesRansomware Attacks Disrupt School ReopeningsLegality of Security Research to be Decided in US Supreme Court CaseMeet the Middlemen Who Connect Cybercriminals With VictimsChart: Does Lack of Diversity Impact the Skills Shortage?Inova Suffers Third-Party Data BreachOur Diversity Program Isn’t Working. What Are We Doing Wrong?Why We Need to Pay Attention to Attacks on the Smart-Built EnvironmentSecureworks to Buy Delve Laboratories for Vulnerability Management7 Cybersecurity Priorities for Government Agencies & Political CampaignsCan You Decode Your Teen’s Texting Language?Gone in a FlashMultiparty Encryption Allows Companies to Solve Security-Data ConundrumTop 5 Identity-Centric Security Imperatives for Newly Minted Remote WorkersTelehealth, Distance Learning, & Online Banking: Securing Digital FrontiersNext-Gen Firewalls 101: Not Just a BuzzwordMicrosoft Fixes 129 Vulnerabilities for September’s Patch TuesdayWordPress Plug-in Has Critical Zero-DayGoogle Cloud Expands Confidential Computing LineupVPNs: The Cyber Elephant in the RoomPost-COVID-19 Cybersecurity Spending Update8 Frequently Asked Questions on Organizations’ Data Protection Programs2020 MDC Sweepstakes Terms and ConditionsName That Toon: Mask OutHow Cybercriminals Take the Fun Out of GamingDDoS Attacks on Education Escalate in 2020How Piyush’s remarkable efforts ignited a larger impact of giving backWarner Music Group Admits BreachCollection of Metadata — as Done by the NSA — Likely Unconstitutional, US Court SuggestsAd Fraud: The Multi-Billion Dollar Cybercrime CISOs Might OverlookStrategic Cyber Warfare Heats UpThe Hidden Security Risks of Business ApplicationsTogether, We Block and Tackle to Give You Peace of MindFacebook Announces Formal Vulnerability Disclosure Policy for Third-Party BugsEvilnum APT Group Employs New Python RATTyposquatting Intensifies Ahead of US ElectionNew Email-Based Malware Campaigns Target BusinessesFake Data and Fake Information: A Treasure Trove for DefendersWhat A Threat Analyst Really Thinks of Intelligence5 Ways for Cybersecurity Teams to Work Smarter, Not HarderMost IoT Hardware Dangerously Easy to Crack55% of Cybersquatted Domains Are Malicious or Potentially FraudulentFacebook & Twitter Remove Russian Accounts Spreading DisinformationNew Jersey Man Sentenced to 7+ Years for Cyber Breaking & EnteringThe Hidden Costs of Losing Security TalentDon’t Forget Cybersecurity on Your Back-to-School List‘KryptoCibule’ Uses Several Tricks to Maximize Cryptocurrency Theft5 Tips for Triaging Risk from Exposed CredentialsNDAA Conference: Opportunity to Improve the Nation’s Cybersecurity PostureDHS Partners with Industry to Offer State, Local Gov’ts Cybersecurity AidWhy Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them)Hypothesis: Cyber Attackers Are After Your Scientific ResearchNew Threat Activity by Lazarus Group Spells Trouble For OrgsAnti-Phishing Startup Pixm Aims to Hook Browser-Based ThreatsApple Signs Shlayer, Legitimizes MalwareNew APT Pioneer Kitten Linked to Iranian GovernmentISO 27701 Paves the Way for a Strategic Approach to PrivacyVulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863Why Are There Still So Many Windows 7 Devices?Poll: Help WantedAI on the Email OffenseTesting & Automation Pay Off for NSA’s DevSecOps ProjectSlack Patches Critical Desktop VulnerabilityMalicious Android Apps Slip Through Google Play ProtectionUVA Researcher Charged with Computer Intrusion & Trade Secret TheftFrom Defense to Offense: Giving CISOs Their DueData Privacy Concerns, Lack of Trust Foil Automated Contact TracingDNC Warns Campaign Staffers of Dating App DangersThe First Smartphone for Free-Ranging KidsAruba Enhances Its Edge Services PlatformTA542 Returns With Emotet: What’s Different NowRansomware Red Flags: 7 Signs You’re About to Get HitRedefining What CISO Success Looks LikeIs China the World’s Greatest Cyber Power?DDoS Attacks Halt NZ Exchange Trading for Third DayVulnerability Volume Poised to Overwhelm Infosec TeamsOld Malware Tool Acquires New TricksFastly to Acquire Signal Sciences for $775MThe Inside Threat from Psychological ManipulatorsUber Data Breach and How to Protect Your InfoWhy Ransomware Targets No Longer Need to Wind Up as Ransomware VictimsHow CISOs Can Play a New Role in Defining the Future of Work‘Transparent Tribe’ APT Group Deploys New Android Spyware for Cyber EspionageHigher Education CISOs Share COVID-19 Response StoriesUS Warns of Ongoing BeagleBoyz Bank-Theft Operations6 Signs Your Supply Chain Risk Just Shot UpThe ‘Shared Responsibility’ Misnomer: Why the Cloud Continues to ConfoundRussian National Arrested for Conspiracy to Hack Nevada CompanyUnderstand and Manage Pesky Persistent ThreatsWith More Use of Cloud, Passwords Become Even Weaker LinkDeep Fake: Setting the Stage for Next-Gen Social EngineeringRansomware Could Be the New Data Breach: 5 Tips to Stay SecureElection Security’s Sticky Problem: Attackers Who Don’t Attack VotesWhat is GPS spoofing?McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEMPhishing Attack Used Box to Land in Victim InboxesOnline Business Fraud Down, Consumer Fraud UpThree Easy Ways to Avoid Meow-like Database AttacksPalo Alto Networks to Acquire The Crypsis Group for $265MThe Fatal Flaw in Data SecurityMITRE Releases ‘Shield’ Active Defense FrameworkCISA Releases 5G Security GuidelinesAttackers Use Unicode & HTML to Bypass Email Security ToolsDeathStalker APT Targets SMBs with Cyber EspionageST21: DB Cybertech with Tranel Hawkins & Ben FarberLarge Ad Network Collects Private Activity Data, Reroutes ClicksNew Cybersecurity Code of Practice for Installers Unveiled by BSIAWhy Should Physical Security Professionals Learn Cybersecurity Skills?Huawei Role in UK 5G Network Set to Be RemovedAverage Cost of a Data Breach in 2020: $3.86MDark Reading Launches New Section on Physical SecurityTransform your Architecture for the Cloud with MVISION UCE and SD-WANUniversity of Utah Pays in Cyber-Extortion Scheme74 Days From the Presidential Election, Security Worries Mount‘Next-Gen’ Supply Chain Attacks Surge 430%Post-Pandemic Digitalization: Building a Human-Centric Cybersecurity StrategyCryptominer Found Embedded in AWS Community AMISmart-Lock Hacks Point to Larger IoT ProblemsFormer Uber CSO Charged in Hack Cover-upTwitter Hack: The Spotlight that Insider Threats NeedWomen in Sales Part 5: The Value of Support Networks and InspirationIBM Db2 Flaw Gives Attackers Read/Write Access to Shared MemoryMFA Mistakes: 6 Ways to Screw Up Multifactor AuthenticationBlack Hat USA 2020 Musings: Weird and Wonderful Virtual Events are Here to StayBlack Hat USA 2020 Recap: Experts Discuss Election Security Questions, but Offer Few AnswersBanks and the New Abnormal10 Resume and Interview Tips from Security ProsFuzzing Services Help Push Technology into DevOps PipelineSophisticated P2P Botnet Targeting SSH ServersCISA Warns of New RAT Aimed at US Defense ContractorsNewly Patched Alexa Flaws a Red Flag for Home WorkersICS Vulnerability Reports Rapidly RiseHow to Control Security Costs During a Down EconomyStolen Data: The Gift That Keeps on GivingWhat Security Means to ProfessionalsRansomware Attack on Carnival May Have Been Its Second Compromise This YearCanadian Government Issues Statement on Credential-Stuffing AttacksNew Campaign Combines Extortion, DDoSFour Ways to Mitigate Supply Chain Security Risks From Ripple20New ‘Duri’ Campaign Uses HTML Smuggling to Deliver MalwareThe Economic Benefits from McAfee’s UCE SolutionHow to Stay Secure on GitHubWhy Quality & Security Both Matter in SoftwareScamsWeek2020Firms Still Struggle to Prioritize Security VulnerabilitiesAdvent Completes Forescout PurchaseReported Breach Count for H1 2020 Lowest in Five YearsCybersecurity Companies Among Smaller Firms Hit with Brand SpoofingBack-to-School: Could Your Remote Learner Be Cyber Cheating?REvil Ransomware Hits Jack Daniel’s ManufacturerShould I Segment my IoT Devices Onto Their Own Networks?The IT Backbone of CybercrimeBack-to-School: Prepping Your Tech for Learning Pods or Micro School444k Affected by an Online Exam Breach: Stay Secure While Distance LearningResearch Casts Doubt on Value of Threat Intel FeedsIcedID Shows Obfuscation Sophistication in New CampaignDHS CISA Warns of Phishing Emails Rigged with KONNI Malware7 Ways to Keep Your Remote Workforce SafeWFH Summer 2020 Caption Contest WinnersCISA Warns of Phishing Campaign with Loan-Relief LureHealthcare Industry Sees Respite From Attacks in First Half of 2020Business Email Compromise Attacks Involving MFA Bypass IncreaseRedCurl APT Group Hacks Global Companies for Corporate EspionageThe Race to Hack a Satellite at DEF CONBoeing’s DEF CON Debut a Sign of the TimesOn Dovorub: Linux Kernel Security Best PracticesOn Drovorub: Linux Kernel Security Best PracticesSecure Development Takes a (Remote) VillageNSA & FBI Disclose New Russian Cyberespionage MalwareWomen in Sales Part 4: Achieving success through growth and balanceBlack Hat USA 2020 Shines Spotlight on the Mental Challenges of CybersecurityForcepoint Hopes for Breakout Moment by Hopping on the ZTA BandwagonWith iOS’s Privacy Nutrition Label, Apple Upstages RegulatorsSecurity Jobs With a Future — And Ones on the Way OutAdaptive Shield Emerges From StealthEmotet Return Brings New Tactics & Evasion TechniquesHow to ‘Online Date’ Safely in 2020FireEye Announces New Bug-Bounty ProgramUsing ‘Data for Good’ to Control the PandemicSANS Security Training Firm Hit with Data BreachVulnerability Discovery in Open Source Libraries Part 1: Tools of the TradeName That Toon: ‘Rise’ and ShineThreats vs. Thrift: Running Effective AppSec During a Global CrisisWhat Security Means to EldersKr00k, KRACK, and the Seams in Wi-Fi, IoT EncryptionResearchers Trick Facial-Recognition SystemsMicrosoft Patches 120 Vulnerabilities, Two Zero-DaysDevelopers Need More Usable Static Code Scanners to Head Off Security BugsSymmetry Systems Emerges from StealthZoom Vulnerabilities Demonstrated in DEF CON TalkIs Edtech the Greatest APT?EU-US Privacy Shield Dissolution: What Happens Next?How We’re Using AI to Usher in the Era of the “Smarter SOC”Zero-Trust Security 101How to Help Spoil the Cybercrime Economy17 Essential Stats About the State of Consumer PrivacyGamifying Password Training Shows Security BenefitsHacking It as a CISO: Advice for Security LeadershipBetter Business Bureau Warns of New Visa ScamCan I Use the Same Security Tools on My IT and OT?Lock-Pickers Face an Uncertain Future OnlineQ2 DDoS Attacks Triple Year Over Year: ReportVulnerability Prioritization: Are You Getting It Right?Digital Clones Could Cause Problems for Identity SystemsReddit Attack Defaces Dozens of ChannelsHacking the PLC via Its Engineering Software400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android PhonesResearcher Finds New Office Macro Attacks for MacOSBEC Campaigns Target Financial Execs via Office 365IoT Security During COVID-19: What We’ve Learned & Where We’re GoingGetting to the Root: How Researchers Identify Zero-Days in the WildResearchers Create New Framework to Evaluate User Security AwarenessA Mix of Optimism and Pessimism for Security of the 2020 ElectionWhere Dark Reading Goes NextOn ‘Invisible Salamanders’ and Insecure MessagesExploiting Google Cloud Platform With EaseOffice 365’s Vast Attack Surface & All the Ways You Don’t Know You’re Being Exploited Through ItInformation Operations Spotlighted at Black Hat as Election Worries RiseOpenText Blends Security, Data Protection for Greater Cyber ResilienceWhy Satellite Communication Eavesdropping Will Remain A ProblemUsing IoT Botnets to Manipulate the Energy MarketWomen in Sales Part 3: Traits for Success in Cybersecurity SalesBroadcom: Staying Safe with WastedLocker Ransomware Variant on the ProwlThe Long Shadow of Stuxnet: New Microsoft Print Spooler Vulns RevealedRemotely Hacking Operations Technology SystemsNew Windows Print Spooler Zero-Day Flaws Harken Back to StuxnetPlatform Security: Intel Pushes to Reduce Supply Chain AttacksCounting for Good: Hardware Counters Un-mask Malware2019 Breach Leads to $80 Million Fine for Capital OneFour Rules and Three Tools to Protect Against Fake SaaS AppsA Real-World Tool for Organizing, Integrating Your Other ToolsEnergy Market Manipulation with High-Wattage IoT BotnetsRipple20: More Vulnerable Devices Identified3 Tips For Better Security Across the Software Supply ChainRobot Character Analysis Reveals Trust IssuesCall an Exorcist! My Robot’s Possessed!What A Security Engineer & Software Engineer Learned By Swapping RolesTales from the Trenches Show Security Issues Endemic to HealthcareSupporting Women in InfoSecDeveloping Community for Woman Infosec Pros in IndiaWhat to Tell Young People of Color About InfoSec CareersSynerComm Reboots a Security Staple with ‘Continuous’ Pen TestingPen Testers Share the Inside Story of Their Arrest and ExonerationSynopsys: Why Security-Minded Companies Are Transitioning to DevSecOpsHealthScare: Prioritizing Medical AppSec ResearchA Most Personal Threat: Implantable Medical DevicesHow An Electronic Medical Record System Flaw Exacerbated the Opioid CrisisA Paramedic’s Guide to Cybersecurity: VideoVoatz Delivers Multi-Layered Security to Protect Electronic VotingVoatz Delivers Multilayered Security to Protect Electronic VotingRussian Election Interference: What’s Next?Building Cybersecurity Strategies in Sub-Saharan AfricaAttack of the Clone: Next-Gen Social Engineering3 Tips for Securing Open Source SoftwareCISA Offers Tool for Career NavigationMicrosoft Teams Vulnerable to Patch Workaround, Researchers ReportDopple-ganging up on Facial Recognition SystemsCybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020Why Confidential Computing Is a Game ChangerDDoS Attacks Doubled in Q2 Compared with Prior QuarterRipple20 Critical Vulnerabilities – Detection Logic and SignaturesLess Than Half of Security Pros Can Identify Their Organization’s Level of RiskPen Testers Who Got Arrested Doing Their Jobs Tell AllHow Ransomware Threats Are Evolving & How to Spot ThemNew Spin on a Longtime DNS Intel Tool6 Dangerous Defaults Attackers Love (and You Should Know)Retooling the SOC for a Post-COVID WorldWhat Security Means to Families25 Most Dangerous SW ErrorsFPGAs Do It Faster Than CPUsMy Experience as a Finance Intern at McAfee for Summer 2020Google & Amazon Replace Apple as Phishers’ Favorite BrandsSecuring IoT as a Remote Workforce Strategy11 Hot Startups to Watch at Black Hat USAFBI Warns on New E-Commerce FraudDHS Urges ‘Highest Priority’ Attention on Old Chinese Malware ThreatNew ‘Nanodegree’ Program Provides Hands-On Cybersecurity TrainingWhy Data Ethics is a Growing CISO PriorityOmdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s DataTravel Management Firm CWT Pays $4.5M to Ransomware AttackersMcAfee Defender’s Blog: NetWalkerTake a “NetWalk” on the Wild SideA Patriotic Solution to the Cybersecurity Skills ShortageHow Should I Securely Destroy/Discard My Devices?How to Keep Remote Learning Pod Students Safe Online 3 Arrested for Massive Twitter BreachNew Initiative Links Cybersecurity Pros to Election OfficialsSource Code Leak – What We Learned and How You Can Protect Your IPTwitter: Employees Compromised in Phone Spear-Phishing Attack3 Ways Social Distancing Can Strengthen your Network‘Hidden Property Abusing’ Allows Attacks on Node.js ApplicationsSmartphone Alternatives for Free-Ranging KidsBrowsers to Enforce Shorter Certificate Life Spans: What Businesses Should KnowDark Web Travel Fraudsters Left Hurting From LockdownsMimecast Buys MessageControlWomen in Sales Part 2: Skilling up for a Career in Cybersecurity SalesIll-Defined Career Paths Hamper Growth for IT Security ProsPoll: Endpoint Extravaganza5 Tips for Optimizing Your Company’s Cyber-Crisis PreparednessGoogle Adds Security Updates to Chrome AutofillCitizens Are Increasingly Worried About How Companies Use Their DataBlack Hat Virtually: An Important Time to Come Together as a CommunitySecurity is a Feeling- With the McAfee #SecureMyLife RT2Win Sweepstakes!Can Macs get Viruses?Understanding Trojan Viruses and How to Get Rid of ThemHow to Wipe Out a Computer VirusIs Your Smart Home Vulnerable to a Hack Attack?Using the Attack Cycle to Up Your Security GameOperation (노스 스타) North Star A Job Offer That’s Too Good to be True?McAfee Defender’s Blog: Operation North Star CampaignHow to Keep Your Data Safe From the Latest Phishing Scam11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual EventAverage Cost of a Data Breach: $3.86 Million‘BootHole’ Vulnerability Exposes Secure Boot Devices to AttackSecurity Flaws Discovered in OKCupid Dating Service70,000+ WordPress Sites Affected by Critical Plug-in FlawDark Reading Video News Desk Returns to Black HatTechnical Challenges of IoT Cybersecurity in a Post-COVID-19 WorldHow to Decipher InfoSec Job Titles’ MysteriesThe Future’s Biggest Cybercrime Threat May Already Be HereCOVID-19: Latest Security News & CommentaryLazarus Group Shifts Gears with Custom RansomwareAvon Server Leaks User Info and Administrative DataOut-of-Date and Unsupported Cloud Workloads Continue as a Common WeaknessResearchers Foil Phishing Attempt on Netflix Customers7.5M Banking Customers Affected in Dave Security BreachAutonomous IT: Less Reacting, More SecuringAs Businesses Move to the Cloud, Cybercriminals Follow Close BehindShinyHunters Offers Stolen Data on Dark WebRatings for Open Source Projects Aim to Make Software More SecureSix Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!!Introducing MITRE ATT&CK in MVISION Cloud: Defend with PrecisionPandemic Credential Stuffing: Cybersecurity’s Ultimate Inside JobVirtually Impossible to Miss McAfee at Black Hat 2020Women in Sales Part 1: Opportunities for Women Across Cybersecurity SalesHunting for Blues – the WSL Plan 9 Protocol BSODSpeed or Security? We Say Speed AND SecurityWhat to Do When Your Social Media Account Gets HackedStaying Home? McAfee Report Shows Malware May Come KnockingMcAfee COVID-19 Report Reveals Pandemic Threat EvolutionStrong Password Ideas to Keep Your Information Safe Ways to Strengthen Your Family’s Digital and Mental WellbeingThe Schrems II Decision: The Day AfterCreate Strong Passwords with a Password GeneratorDevices and Distancing: What Digital Data Says About Life From HomeHow to Adopt a Work-from-Home MindsetTime to Get Proactive About Threat HuntingOnline Banking—Simple Steps to Protect Yourself from Bank FraudWe’re Named 2020 Gartner Peer Insights Customers’ Choice for Enterprise DLPMessenger Rooms: New Video Chat Option is Fun But Has RisksHow to Protect Your Privacy From Tracking AppsHow to Keep Your Celebrations Happening – Virtually & Safely!Best Practices for Adapting to a Remote Work Lifestyle Multi-Cloud Environment Challenges for Government AgenciesHow Entertaining Ourselves at Home Has Become a Risky BusinessWhy Should You Pay for a Security Solution?McAfee XDR: Taking Threat Detection and Response to a New LevelMeaningful Context for Your Endpoint Threat InvestigationsIndustry Experts Weigh in on McAfee’s Proactive CybersecurityMcAfee Vision for SASE: Making Cloud Adoption Fast, Easy and SecureHow McAfee Makes an Impact: 2019 CSR Report LaunchMedical Care #FromHome: Telemedicine and SeniorsRead Before You Binge-Watch: Here are the TV Shows & Movies to Look Out ForRipple20 Vulnerability Mitigation Best PracticesWhat to Expect from the Next Generation of Secure Web GatewaysWorking from Home in 2020: Threat Actors Target the Cloud25 Amazing Quotes To Inspire You This Fathers DayST20: Quantum Computing with Steve Grobman & Jon KingMy Adventures Hacking the iParcelBoxWhat’s in the Box? Part II: Hacking the iParcelBoxInternet Privacy: Tips & Tricks for Staying Secure OnlineBeware When You Search for These TV Shows and MoviesMcAfee Team Members Give Back During Pandemic by 3D Printing PPEBeware When You Search for These TV Shows and MoviesReports of Online Predators on the Rise. How to Keep Your Kids Safe. Beware When You Search for These TV Shows and MoviesTime to Move from Reactive to Proactive Endpoint SecurityNew Insights From McAfee’s Survey Around Remote WorkBeware When You Search for These TV Shows and MoviesThe Future of Work: How Technology & the WFH Landscape Are Making an ImpactQuantifying Cloud Security EffectivenessRagnarLocker Ransomware Threatens to Release Confidential InformationYour CEO Just Asked If We Are Protected from This Threat? Now What?Simplify Secure Cloud Adoption with Your Next-Gen Secure Web GatewayOneDrive Phishing AwarenessEntertainment #FromHome: How to start your own podcastEntertainment #FromHome: Photo Backups, Digital Picture Frames, and More!Does PC Cleaning Improve Performance?Internet Safety Begins with All of UsWhen Less is More – MVISION EDR Leads Detection Efficiency & Alert QualityDoes your Next-gen SWG provide Next-Gen Availability?Safeguarding Connectivity: The Security Implications of TelecomsDefending our DoD Customers at HomeThe Power of ConvergenceLeaning into Change with the McAfee Family2020 Voters: What You Need to Know About Election SecurityHow I Use McAfee’s Volunteer Time Off to Help Lost Paws Find HomesEntertainment #FromHome: What to do When You’re Bored at HomeOnline Dating #FromHomeDate Night #FromHome IdeasWorking from Home in 2020: How Cloud Use ChangedCool and Helpful McAfee Tech to Help Secure Your Online LifeThe GDPR, Year IIGet a Mac instead!Windows Security UpdateNew Virus10 Latest ThreatsMy Flight Path: From the Royal Air Force to McAfeeWhat is disk cleanup and does it remove viruses?My email has been hacked! What should I do next?How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMinerProtect Yourself Against Phishing Scams With These Security TipsThe “Zero Day” ConundrumHow to Stay Protected From Malware While Online at HomeGood Malware Protection Doesn’t Need to Slow You Down!Is Your Child Being Cyberbullied? What Parents Need to KnowHow to Secure Your Data Everywhere? It’s Easy With Unified Cloud EdgeMcAfee Recognized on CRN’s 2020 Women of the ChannelST19: Unified Cloud Edge with Cindy Chen & Michael SchneiderST18 Chinese Cyber Crime with Anne An & Patrick FlynnMcAfee’s Award-Winning Online Safety Program Goes VirtualMaking Moves to Go Green at McAfee WaterlooWhat the hell does “zero day” even mean anymore?Mirror Mirror On The Wall, Is My Cloud The Most Secure?What Does Your Password Say About Your Preferences?ENS 10.7 Rolls Back the Curtain on RansomwareCybercriminals Actively Exploiting RDP to Target Remote OrganizationsMcAfee Surveys Cyber-Threats in the Age of CoronavirusCOVID-19 – Malware Makes Hay During a PandemicWorld Password Day 2020Personal and Professional Development From HomeHow to Ace Your Video Interview: Job Hunting From HomeSetting the Stage for Your Video Interview: Job Hunting From HomeOnline Scam Awareness: Staying Safer in Uncertain TimesWhy Do I Need a Password Manager?McAfee Values Its Working Mothers GloballyWhat’s the Right Age to Give Your Child a Phone?Tales From the Trenches; a Lockbit Ransomware StoryRansomware Attacks: Cybercriminals Pinpointing Healthcare OrganizationsSchool From Home: Project-Based LearningMITRE APT29 Evaluation – Importance of Prevention in Endpoint SecurityConnect With Confidence: Benefits of Using a Personal VPN Stay Ahead of Misinformation – 5 Ways to Combat Fake NewsOnline shopping scams – 7 ways to fight them School #FromHome: The Challenges of Online Learning for Parents and KidsSchool #FromHome: Bring Structure to Your DaySchool from Home: “Square One” BasicsSafe Collaboration with McAfee and Microsoft TeamsHow to Stay Secure While Distance Learning: Don’t Get Schooled by HackersSOC vs MITRE APT29 evaluation – Racing with Cozy BearEstablishing Security Maturity Through CIS Cyber Defense FrameworkKeeping Virtual Play Dates, Hang Outs, and Video Chats Safe for EveryoneThe Latest Mobile Scams & How To Stay SafeCustom Applications with CASBFive Tips from McAfee’s Remote WorkersMcAfee and Atlassian Collaborate to Deliver Cloud Security CapabilitiesMcAfee MVISION Cloud for Atlassian AccessShift Left Inline – Integration with Atlassian Bitbucket CI/CD PipesZero Trust, SASE-Digital Enablers or Adding Complexity to Cyber EcosystemsMalBus Actor Changed Market from Google Play to ONE StoreNear Real-Time DLP and Malware support for IaaSHow One McAfee Advanced Threat Researcher is Giving Back During COVID-19CVE Vulnerability Scanning for ContainersSmart Government and IoT: The Importance of IntegrationTransitioning to a Mass Remote Workforce – We Must Verify Before TrustingCOVID-19 Threat Update – now includes Blood for SaleHow Secure Is Video Conferencing?Internet Safety for Kids: A Refresher for Homebound FamiliesChoosing the Right Video Conferencing Service for you and your EnterpriseTop 3 Data Visualization Capabilities in a CASB SolutionNemty Ransomware – Learning by DoingHow to Stay Cyber Safe While Social-DistancingHow Do Hackers Hack Phones and How Can I Prevent It?What is Data Privacy and How Can I Safeguard It?ST17: Secure Remote Working with Raj Samani & Mo CashmanWhy Light Point Security Is Joining the McAfee TeamDon’t Be an April Fool – Protect Your Digital AssetsMcAfee Named a 2020 Gartner Peer Insights Customers’ Choice for SWG10 McAfee Women Share Top Career HighlightsCloud Security: Why You Need Device ControlLittle Ones Online More? Here Are 10 Basics To Keep Them SafeScams Facing Consumers in the New Digital WFH LandscapeRansomware Maze

Security Consulting

Advising customers on cybersecurity
strategy, governance, compliance and
technical solutions.

Professional Services

Implementing and supporting
cybersecurity technical
solutions.

Managed Services

For on-premises and cloud-based
customers affording a single buy point
for technology and services.

RECON Technologies is an Australian IT and cyber security consulting firm focused on assisting our clients with deep level consulting, integration and management to protect their brand and reputation. We assist in technology adoption and cyber threat analysis with a focus on enabling our clients to manage cyber risk within an ever changing threat landscape.

RECON provides custom-designed, leading edge security solutions and systems from an independent standpoint. We ensure that technology solutions and capabilities marry to your current business maturity and capability with the intention of ensuring  you can continually grow your cyber defences.

We work heavily in large enterprise and public sector giving us a deep understanding of the complexity and dependencies that are faced when building and defining a cyber resilience strategy.

We are an independent, specialist cyber security company with the highest standards of professional ethics. Our clients are our partners, they rely on us for our expertise, experience and knowledge under a strict code of confidentiality.

Why we are different

We get it done, quickly easily and with all the right documentation and checks – it’s that easy! Our customers keep coming back to us for help with issues or to help develop their staff.

Experience

Our experience in the CyberSecurity field stretches back to the early ‘90’s, the days of DOS. In the Cyber world nothing beats experience and we have lots of it.

Responsive

When a cyber attack happens, hours become minutes which become seconds. We run a high response 365 x 24 support desk, we’ll always respond.

Certified

Across all technologies that we think matter. Australian Federal government clearance.

Independence

Clear, concise, accurate advice un-influenced by mainstream vendor marketing spin.