Articles of interest from the week of March 7, 2022

How Attackers Sidestep the Cyber Kill Chain

Many of the most popular cyberattacks don't follow all the steps of the cyber kill chain, but you have other methods to detect threats. (By Maria Korolov, CSO)

07 Mar 2022
Read More

Articles of interest from the week of February 21, 2022

Attackers Hone Their Playbooks, Become More Agile

Cybercriminals and nation-state actors adapted to defenders' tactics and became more efficient in 2021, with attackers relying more on data leaks combined with ransomware to extort increasing sums of

21 Feb 2022
Read More

Articles of interest from the week of February 7, 2022

MFA Still Offers the Best Chance of Keeping Data Secure

These best practices explain why MFA remains one of the best defenses for mitigating password risk and preventing cybercriminals from exploiting user credentials. (By Help Net Security)

07 Feb 2022
Read More

Articles of interest from the week of January 24, 2022

Lazarus Hackers Use Windows Update To Deploy Malware

North Korean-backed hacking group Lazarus has added the Windows Update client to its list of living-off-the-land binaries (LoLBins) and is now actively using it to execute malicious code on

24 Jan 2022
Read More

Articles of interest from the week of January 10, 2022

FTC to Go After Companies that Ignore Log4j

Companies that fail to protect consumer data from Log4J attacks are at risk of facing Equifax-esque legal action and fines, the FTC warned. The Federal Trade Commission (FTC) will muster its legal muscle

10 Jan 2022
Read More

Articles of interest from the week of December 27, 2021

Top 7 Common Cybersecurity Myths — Busted

Even with the growing awareness about cybersecurity, many myths about it are prevalent. These misconceptions can be a barrier to effective security. Read on to find out which of the following you thought

27 Dec 2021
Read More