Zephyrnet Logo

Tag: Security Bloggers Network

BSidesSF 2020 – Sam “Frenchie” Stewart’s And Maya Kaczorowski’s ‘Checking Your –Privileged Container’

Many thanks to Security BSides SF for publishing their outstanding conference videos on YouTube. Permalink *** This is a Security Bloggers Network syndicated blog...

How to Upskill Your DevOps

Editor’s Note: Improving skills is always a good idea. With this in mind, don’t miss the upcoming All Day...

HP Support Assistant App Riddled with Security Issues and Vulnerabilities, Researcher Finds

A security researcher found 10 vulnerabilities in the HP Support Assistant application shipped with every laptop the company makes, from the officially...

Thirty-four Years in IT – Leadership Chaos, Career Derailed (Part 10)

This post is the hardest one to write. I’ve been thinking about it for years without being able to put words to...

Sophisticated COVID-19–Based Phishing Attacks Leverage PDF Attachments and SaaS to Bypass Defenses

Menlo Security has detected a sophisticated, multi-stage attack leveraging the current COVID-19 pandemic. Our data has shown that COVID-19–based attacks are much...

Shmoocon 2020 – Panel: Casey Ellis’, Tod Beardsley’s, Kimber Dowsett’s, Jack Cable’s, and Amelie Koran (Moderator): ‘Hacking Democracy: On Securing an Election’

Thanks to 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist...

Shmoocon 2020 – Heidi & Bruce Potter’s ‘Opening Remarks, Rumblings, Ruminations And Rants’

Thanks to 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist...

Map It. Zap It. Covid-19 and Rural America #GoodCovidDomains

This post may seem off-topic for my regular cybercrime and cyber security readers, but these are unusual times. Regular readers know that...

The Essential Guide to Coronavirus Scams | Avast

The coronavirus pandemic has changed the way so many of us live our lives that it’s on many of our minds throughout...

How Understanding Cybersecurity Threats Influences Your Defenses

There are the threats you know of.  Then, there are the threats you should actually be defending against. Right now, some people think that these...

[Webinar] Are You Acquiring the Next Big Breach?

Learn why application security vulnerabilities are a serious consideration in tech due diligence and how to evaluate your security risk in M&A...

Shmoocon 2020 – Mark Manning’s ‘Command And KubeCTL: Real-World Kubernetes Security For Pentesters’

Thanks to 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist...

Latest Intelligence

spot_img
spot_img