Back to Basics: Let’s Forget About the GDPR… For A Moment

At this point it’s fairly safe to assume that most everyone in the business of “data” has heard of the European Union (EU)-wide General...

The Complete Guide to Container Security

The Complete Guide to Container Security #outlook a{ padding:0; } body{ width:100%...

It’s Time for Managers to Lead Security by Example, Not Blame Younger Workers

The age gap is something that all organisations over the years have had to deal with in one way or another. But the flood...

Cloud Migration Fundamentals: Overcoming Barriers to App Security [Infographic]

As more organizations move to the cloud, the line of responsibility in securing applications can become rather blurred. The concept of control has historically rested...

Ransomware and malicious crypto miners in 2016-2018

Ransomware is not an unfamiliar threat. For the last few years it has been affecting the world of cybersecurity, infecting and blocking access to...

Achieve CIS Benchmarks for Cloud, Container and DevOps Environments

Achieve CIS Benchmarks for Cloud, Container and DevOps Environments #outlook a{ padding:0;...

Black Hat 2018

<img src="/sites/default/files/Blackhat-logo.png"> Join Digital Guardian at Black Hat 2018! - Read more

Making Smarter Access Control Decisions

Hey Siri, block that attacker, please Wouldn’t it be great if Siri, Alexa, or Google Assistant had the intelligence to figure out malicious intent, govern...

Pbot: evolving adware

The adware PBot (PythonBot) got its name because its core modules are written in Python. It was more than a year ago that we...

Zero Trust Security and DevOps Take the Crown at AWS Public Sector Summit 2018

Last week, Amazon Web Services hosted its AWS Public Sector Summit in Washington, DC. In its 9th year, the event attracted thousands of global...

Latest article

Hackers Use Six-Layer Persistence to Maintain Access on Compromised FreePBX Systems

A hacker group known as INJ3CTOR3 has been running an active campaign against FreePBX systems, deploying a newly discovered PHP webshell called JOMANGY that...

Metasploit Wrap Up 05/22/2026

Another week, another authentication bypassOur humble Metasploit weekly(ish) blog has been blessed with a new network component vulnerability. The dynamic duo of @sfewer-r7 and...

FBI warns of Kali Oauth stealers

The FBI has warned of the danger from a new wave of phishing attacks generated by a tool called Kali365....

Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can Bypass BitLocker

Microsoft has released a temporary mitigation for YellowKey, a Windows zero-day that can reportedly bypass BitLocker protections. The post Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can...