A new timeline is here! Today we have the list of the main cyber attacks occurred in the second half of January 2020. In this timeline I have collected a total of 83 events, if we consider ...
At the 2020 RSA Conference in San Francisco, protecting the upcoming presidential election was a hot topic, from thwarting cyberattacks at polling places to preventing fake headlines from ...
Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments.
What could happen to me? Many of us think like that. But the dangers do not lurk visibly in our environment. They are hidden in the digital world that has become so familiar to us. ...
Expert panel sesh turns heated on infosec conference's opening day
A French court canceled today a decision by the South-Est Region of France to undertake a series of tests using facial recognition at the entrance of two schools
Cyberattacks, though frequently thought of as ‘sophisticated’, are often anything but. They are actually surprisingly straightforward and mostly financially motivated. We often see the ...
The same passion that brought you to your first cybersecurity job could also leave you feeling underappreciated and cause you to slide toward burnout.
Venture capitalists have poured money into cybersecurity in recent years – their investments offer a glimpse at what products, solutions and startups are
We are only as great as the story we leave behind.
Security analyst John Strand had a contract to test a correctional facility’s defenses. He sent the best person for the job: his mother.
Artificial intelligence and machine learning tools could go a long way to helping to fight cybercrime. But these technologies aren't a silver bullet, and could also be exploited by ...
Atomic Red Team is a library of simple tests that every security team can execute to test their defenses. Tests are focused, have few dependencies, and are defined in a structured format ...