Making Headlines: SAML

On February 27, 2018 the CERT Division of Carnegie Mellon University’s Software Engineering Institute issued advisory #475445, outlining a design flaw in Security Assertion...

Goodfellas, the Brazilian carding scene is after you

There are three ways of doing things in the malware business: the right way, the wrong way and the way Brazilians do it. From...

Centrify for NIST 800-171 MFA Compliance

I often speak with Federal System Integrators (FSIs) who need to implement Multi-Factor Authentication (MFA) as part of their NIST 800-171 compliance. Specifically section 3.5.3...

OT Cybersecurity – Securing Your Industrial Operations for Reliability and Uptime

OT Cybersecurity - Securing Your Industrial Operations for Reliability and Uptime #outlook...

A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My...

As part of Imperva’s efforts to protect our customers’ data, we have an ongoing research project focused on analyzing and sharing different attack methods...

Time of death? A therapeutic postmortem of connected medicine

#TheSAS2017 presentation: Smart Medicine Breaches Its “First Do No Harm” Principle At last year’s Security Analyst Summit 2017 we predicted that medical networks would be...

SEC Clarification: Companies Must Disclose Breaches

In late February, the U.S. Security and Exchange Commission (SEC) issued new cybersecurity guidance in the form of an “interpretive release.” According to the...

Somebody’s watching! When cameras are more than just ‘smart’

Every year the number of smart devices grows. Coffee machines, bracelets, fridges, cars and loads of other useful gadgets have now gone smart. We...

Masha and these Bears

Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a prolific, well resourced, and persistent adversary. They are sometimes portrayed as wild...

Latest article

Key Takeaways and Top Cybersecurity Predictions for 2026

As the threat landscape keeps shifting, security teams are being asked to do more than react. They are expected to look ahead, connect the...

Trend Micro Apex Central Multiple Vulnerabilities

Trend Micro Apex Central Multiple Vulnerabilities CVE-2025-69258: MsgReceiver.exe LoadLibraryEx RCE (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)MsgReceiver.exe listens on default TCP port 20001 and accepts messages having the following structures://...

[R1] Nessus Agent Versions 11.0.3 and 10.9.3 Fix One Vulnerability

Nessus Agent Versions 11.0.3 and 10.9.3 Fix One Vulnerability Arnie Cabral Wed, 01/07/2026 - 08:47 A vulnerability has been identified in the installation/uninstallation...

GRU-Linked BlueDelta Evolves Credential Harvesting

The analysis cut-off date for this report was September 11, 2025 Executive Summary Between February and September 2025, Recorded Future’s Insikt Group identified...