FW: [Demo] Detect Threats and Identify Unauthorized Changes
Tripwire, Inc.
A MitM extension for Chrome
Browser extensions make our lives easier: they hide obtrusive advertising, translate text, help us choose in online stores, etc. There are also less desirable...
Clustering App Attacks with Machine Learning Part 1: A Walk Outside the Lab
A lot of research has been done on clustering attacks of different types using machine learning algorithms with high rates of success. Much of...
SecurIT: Making Zero Trust a Reality for CIOs and CISOs
On June 13, C-level and senior management leaders from global companies spanning multiple industries will gather in San Francisco at SecurIT: the Zero Trust...
Defending Critical Infrastructure against Cyber Attacks
Defending Critical Infrastructure against Cyber Attacks #outlook a{ padding:0; } body{ width:100%...
Zero to Account Takeover: How I ‘Impersonated’ Someone Else Using Auth0
There’s a fine line between an unintended use and a bug; this was my conclusion after taking a look at Auth0, an identity-as-a-service offering...
DG CUE 2018
DG CUE
- Read more
FIFA public Wi-Fi guide: which host cities have the most secure networks?
We all know how easy it is for users to connect to open Wi-Fi networks in public places. Well, it is equally straightforward for...
New research shows 75% of ‘open’ Redis servers infected
Since our initial report on the RedisWannaMine attack that propagates through open Redis and Windows servers, we’ve been hearing about more and more attacks...