Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.
Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.
Find out why IT pros in Australia need to take the initiative to self-upskill, and learn how this could lead to salary increases and promotions.
Cyber threat hunting combines strategies, advanced technologies and skilled analysts to methodically examine networks, endpoints and data repositories. Its objective is to uncover stealthy malicious activities, reduce dwell time for undetected threats and bolster an organization’s capability to withstand multi-vector attacks. This TechRepublic Premium article, written by Franklin Okeke, aims to look at threat hunting …
On 10/6/2023, we announced a 6-month EOL notice for Security Onion 2.3: https://blog.securityonion.net/2023/10/6-month-eol-notice-for-security-onion-23.html Security Onion 2.3 has now reached End […]
Dead and loving it? Discover the definition, the benefits, drawbacks, recommended vendors and more.
In March 2024, the Indian audio and wearables brand boAt suffered a data breach that exposed 7.5M customer records. The data included physical and email address, names and phone numbers, all of which were subsequently published to a popular clear web hacking forum.