Laden...
The day's top cybersecurity news and in-depth coverage
June 16, 2022
The botnet built by the platform-independent worm malware currently enables cryptomining. Read more â¶
On the heels of Amazonâs HQ2 landing in NoVa, major tech companies like Microsoft and Google and unicorn companies like ID.me are realizing the benefits of Fairfax County. Our local economy and location include an ecosystem of incubators, venture capital/private equity, and workforce development.
App-based location data has been used against individuals, and that presents real risks for those people and organizations.
Sigma rules allow you to detect anomalies in log events and identify suspicious activity.
By setting yourself up as the defender, the solver of problems, you cast your business colleagues as hapless victims or, worse, threats. This is not a useful construct for engagement.
Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.
The newest releases of Nebulonâs ImmutableBoot and TimeJump backup systems boast 'reboot-to-recover' functionality for Linux systems.
These common missteps and misconceptions may be keeping your vulnerability management from being the best it can be.
© 2025