SANS Institute Founder Dies

SANS Institute Founder Dies

American cybersecurity training advocate, technologist, and entrepreneur Alan Terry Paller has died at the age of 76.  Paller’s death occurred on November 9 at his home in Bethesda, Maryland. His passing was announced by the Bethesda-based SANS Institute, which Paller and his wife, Marsha Mann Paller, founded in 1989. The Institute went on to become one of the world’s leading nongovernment cybersecurity training programs.  Paller was born in Indianapolis on September 17, 1945, to an engineer and a high…

Read More

Business travel likely to remain low permanently

Business travel likely to remain low permanently

Business travel likely to remain low permanently | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Business travel likely to remain permanently low

Business travel likely to remain low permanently

Business travel likely to remain permanently low | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Docker SSO is Coming – Docker Blog

Docker SSO is Coming – Docker Blog

The impending winter and holiday season hasn’t slowed us down here at Docker HQ. In fact, our engineers have been hard at work to put the finishing touches on one of our most requested features by our enterprise customers: Docker Single Sign-On (SSO). 🎄🎁 With Docker SSO enabled, users can authenticate using their organization’s standard identity provider (IdP). This makes it easier for new users to quickly get started with Docker using their organization-provided email…

Read More

Listen to Teresa Shea, VP of Cyber at Raytheon Intelligence & Space talk enterprise threats

Listen to Teresa Shea, VP of Cyber at Raytheon Intelligence & Space talk enterprise threats

Listen to Teresa Shea, VP of Cyber at Raytheon Intelligence & Space talk enterprise threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Panasonic discloses data breach

Panasonic discloses data breach

Panasonic discloses data breach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

APT groups from China, Russia, and India adopt novel attack technique

APT groups from China, Russia, and India adopt novel attack technique

State-sponsored hacking groups, also known as advanced persistent threats (APTs), have adopted this year a new attack technique called “RTF Template Injection,” which has brought a new twist and made their attacks harder to detect and stop. In a report today, email security firm Proofpoint said that APTs from China, Russia, and India are already exploiting this technique, which they also expect to see adopted by financially-motivated threat actors as well. What is RTF Template…

Read More

APTs Leverage New RTF Phishing Tactic

APTs Leverage New RTF Phishing Tactic

Researchers are warning of a new phishing attack technique, where attackers leverage a legitimate template functionality in the Rich Text Format (RTF) file format in order to retrieve malicious payloads from a remote URL. The attack was observed as early as January, but since then researchers with Proofpoint have observed advanced persistent threat (APT) actors increasingly adopting the phishing tactic in the second and third quarter of 2021. Researchers warn that the simplicity of the…

Read More

What Is SIM Swapping? 3 Ways to Protect Your Smartphone

What Is SIM Swapping? 3 Ways to Protect Your Smartphone

You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in a taxi or lost an expensive ring down the drain. You never let your smartphone out of your sight, yet one day you notice it’s acting oddly.   Did you know that your device can fall into cybercriminals’ hands without ever leaving yours? SIM swapping is a method that allows criminals to take control of your smartphone and break into your online accounts.  Don’t worry:…

Read More

What Is SIM Swapping? 3 Ways to Protect Your Smartphone

What Is SIM Swapping? 3 Ways to Protect Your Smartphone

You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in a taxi or lost an expensive ring down the drain. You never let your smartphone out of your sight, yet one day you notice it’s acting oddly.   Did you know that your device can fall into cybercriminals’ hands without ever leaving yours? SIM swapping is a method that allows criminals to take control of your smartphone and break into your online accounts.  Don’t worry:…

Read More
1 2,126 2,127 2,128 2,129 2,130 2,763