S3 Ep71: VMware escapes, PHP holes, WP plugin woes, and scary scams [Podcast + Transcript]

Credit to Author: Paul Ducklin| Date: Thu, 24 Feb 2022 16:51:41 +0000
Latest episode – listen now!
Read more
Credit to Author: Paul Ducklin| Date: Thu, 24 Feb 2022 16:51:41 +0000
Latest episode – listen now!
Read more
Credit to Author: Paul Ducklin| Date: Thu, 24 Feb 2022 16:51:41 +0000
Latest episode – listen now!
Read more
Credit to Author: Alice Barford| Date: Thu, 24 Feb 2022 09:01:20 +0000
Tips to help you investigate incidents from experienced security analysts
Read more
Credit to Author: stephenlawton| Date: Wed, 23 Feb 2022 17:51:13 +0000
Prevention includes reducing your attack surface and preventing attacks from running
Read more
Credit to Author: Paul Ducklin| Date: Wed, 23 Feb 2022 17:59:12 +0000
Problems with Apple’s Tracker Detect system, which warns you of likely stalking attempts using hidden AirTags.
Read more
Credit to Author: Andrew Brandt| Date: Wed, 23 Feb 2022 11:30:07 +0000
Some code used in the ransomware bear a resemblance to code used in Dridex malware, hinting at a common origin
Read more
Credit to Author: Chester Wisniewski| Date: Wed, 23 Feb 2022 04:04:23 +0000
A review of 15 years of activity designed to distract, confuse, deny, destablize, and divide
Read more
Credit to Author: Chris McCormack| Date: Tue, 22 Feb 2022 20:32:29 +0000
Sophos ZTNA provides a number of advantages over remote-access VPN – enabling remote workers to access the applications they need with much stronger security, all while making management a lot easier and providing a smoother end-user experience. Better security Sophos ZTNA provides better security for four reasons: Sophos ZTNA removes the need for vulnerable old […]
Read more
Credit to Author: Paul Ducklin| Date: Tue, 22 Feb 2022 17:26:37 +0000
A straight-talking bug report written in plain English by an actual expert – there’s a teachable moment in this cybersecurity story!
Read more
Credit to Author: Editor| Date: Mon, 21 Feb 2022 14:00:39 +0000
The working landscape has changed, almost beyond recognition. Working remotely is now commonplace, and data commonly resides in the public cloud and within software-as-a-service applications. The traditional perimeter security model is obsolete and it’s time for a change. Enter zero-trust network access as a new cybersecurity philosophy that removes implied trust and instead allows only […]
Read more