On Systems, Smoke Alerts, and Lessons Learned from The Paris Notre-Dame Cathedral Fire

There is a great exposé in the New York Times breaking down the timeline and mis-steps in response to the fire that occurred in...

GUEST BLOG: A Gen Z’s Perspective on Cybersecurity

I had the pleasure to mentor a summer intern named Min Ji Kim, who is returning to NYU to continue her education next week....

Agent 1433: remote attack on Microsoft SQL Server

All over the world companies large and small use Microsoft SQL Server for database management. Highly popular yet insufficiently protected, this DBMS is a...

IT threat evolution Q2 2019

Targeted attacks and malware campaigns More about ShadowHammer In March, we published the results of our investigation into a sophisticated supply-chain attack involving the ASUS Live...

Top 3 PAM Features that Set Centrify Zero Trust Privilege Apart for Cloud Migrations

Ask any sales person what the most common question they get from prospects is, and the answer will typically be the same: “What makes...

Recent Cloud Atlas activity

Also known as Inception, Cloud Atlas is an actor that has a long history of cyber-espionage operations targeting industries and governmental entities. We first...

Centrify Mid-Year Data Breach Report: Credential Abuse One of the Top Threats of Cyber...

It’s hard to believe that we’re already more than halfway through 2019. Or as I like to put it, I’ve already wasted one month...

Latest article

Substack Breach May Have Leaked Nearly 700,000 User Details Online

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post...

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics - Read more

The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP

I don’t know about you, but when I think about “critical vulnerabilities,” I usually picture ransomware, data theft, or maybe a server falling over...

[R1] Security Center Version 6.8.0 Fixes Multiple Vulnerabilities

Security Center Version 6.8.0 Fixes Multiple Vulnerabilities Arnie Cabral Wed, 02/18/2026 - 08:32 Security Center leverages third-party software to help provide underlying functionality....