Zero Trust Security for the New Australian Data Breach Law

Many Australian businesses need to rethink their approach to security to prepare for their nation’s new mandatory data breach notification law which take effect...

Gas is too expensive? Let’s make it cheap!

A few months ago, while undertaking unrelated research into online connected devices, we uncovered something surprising and realized almost immediately that we could be...

Escaping Data-Breach Groundhog Day

Countless companies globally are trapped in data breach Groundhog Day, unable to escape a repeating cycle of cyber attacks. In the 2018 Thales Data Threat...

What do Equifax, HBO, Uber and Yahoo All Have in Common?

A consumer ratings agency, a cable network, a transportation company and a web services provider. What ties them together? Sure, they were all impacted...

Every little bitcoin helps

It often happens that inventions and technologies that start out good end up turning into dangerous tools in the hands of criminals. Blockchain is...

Cybercriminals target early IRS 2018 refunds now

On Monday, Jan 29th, IRS officially opened its 2018 season. Some taxpayers already filed their taxes and cybercriminals know it too. So, right after...

Denis and Co.

In April 2017, we published a detailed review of a malicious program that used DNS tunneling to communicate to its C&C. That study prompted...

Centrify to Discuss Zero Trust Security at the ICIT 2018 Winter Summit

Following the high-profile breach of the US Office of Personnel Management (OPM), which exposed the personal data of millions of Americans, the House of Representatives’...

4 Months to Go: A New Year GDPR Checklist

As we enter the New Year, IT and security leaders have most likely been glued to revelations of major new CPU-level vulnerabilities Meltdown and...

Data Breaches Plague Organizations for Years

Once an organization’s network is breached, extinguishing the flames is just the first step in a long, painful and costly journey to recovery. There’s...

Latest article

Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence

Open Source Intelligence (OSINT) has become a cornerstone of cybersecurity threat intelligence. In today’s digital landscape, organizations face a constant barrage of cyber threats,...

BreachForums (2025) – 324,449 breached accounts

In October 2025, a reincarnation of the hacking forum BreachForums, which had previously been shut down multiple times, was taken offline by a coalition...

Trend Micro patches critical flaws in its Apex Central software

Security company Trend Micro has been compelled to issue a patch for its own Apex Central software management tool after...

Metasploit Wrap-Up 01/09/2026

RISC-V PayloadsThis week brings more RISC-V payloads from community member bcoles. One provides a new adapter which allows RISC-V payloads to be converted to commands...