Defending Critical Infrastructure against Cyber Attacks
Defending Critical Infrastructure against Cyber Attacks #outlook a{ padding:0; } body{ width:100%...
Zero to Account Takeover: How I ‘Impersonated’ Someone Else Using Auth0
There’s a fine line between an unintended use and a bug; this was my conclusion after taking a look at Auth0, an identity-as-a-service offering...
DG CUE 2018
DG CUE
- Read more
FIFA public Wi-Fi guide: which host cities have the most secure networks?
We all know how easy it is for users to connect to open Wi-Fi networks in public places. Well, it is equally straightforward for...
New research shows 75% of ‘open’ Redis servers infected
Since our initial report on the RedisWannaMine attack that propagates through open Redis and Windows servers, we’ve been hearing about more and more attacks...
Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games...
What’s in it for Consumers? The Top 5 Privacy Benefits of the GDPR
The General Data Protection Regulation, or GDPR for short, is a major new European privacy law that went into effect on May 25. GDPR...
MITRE ATT&CK Matrix with CIS Controls and Tripwire mapping
MITRE ATT&CK Matrix with CIS Controls and Tripwire mapping #outlook a{ padding:0;...











