Timeline: Top 15 Notable Cyberattacks and Data Breaches

These 15 cyber attacks or data breaches impacted large swaths of users across the United States and changed what was possible in cybersecurity. Read more »

US Government, Microsoft Aim to Disrupt Russian threat actor ‘Star Blizzard’

Read more about the U.S. Department of Justice and Microsoft’s efforts to interrupt the activities of Russian-based threat actor Star Blizzard, and learn how to protect from this threat. Read more »

Rspamd: Open-source spam filtering system

Rspamd is an open-source spam filtering and email processing framework designed to evaluate messages based on a wide range of rules, including regular expressions, statistical analysis, and integrations with... Read more »

Setting Up Your Network Security? Avoid These 4 Mistakes

Learn how to execute the fundamentals, harden your defenses, and protect your business’s network security with no high-tech software. Read more »

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them. Read more »

4 Reasons Not to Use a Fax Server and 3 Better Solutions

Using a fax server is a headache most companies can avoid. Modern solutions are cheaper, faster, and better for everyone at the office. Read more »

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!

MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a custom-built C# LDAP parser designed for tokenization and syntax... Read more »

Exclusive: Google Cloud Updates Confidential Computing Portfolio

Users of Google Cloud’s virtual machines can now get in-house attestation for VMs that offer AMD encrypted virtualization. Read more »

Suricata: Open-source network analysis and threat detection

Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM),... Read more »

What Is Inside Microsoft’s Major Windows 11 Update?

Version 24H2 adds the sudo command and alerts users when an application accesses their physical location. Microsoft polished other security features, too. Read more »
Subscribe to our Newsletter