These 15 cyber attacks or data breaches impacted large swaths of users across the United States and changed what was possible in cybersecurity. Read more »
Read more about the U.S. Department of Justice and Microsoft’s efforts to interrupt the activities of Russian-based threat actor Star Blizzard, and learn how to protect from this threat. Read more »
Rspamd is an open-source spam filtering and email processing framework designed to evaluate messages based on a wide range of rules, including regular expressions, statistical analysis, and integrations with... Read more »
Learn how to execute the fundamentals, harden your defenses, and protect your business’s network security with no high-tech software. Read more »
Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them. Read more »
Using a fax server is a headache most companies can avoid. Modern solutions are cheaper, faster, and better for everyone at the office. Read more »
MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a custom-built C# LDAP parser designed for tokenization and syntax... Read more »
Users of Google Cloud’s virtual machines can now get in-house attestation for VMs that offer AMD encrypted virtualization. Read more »
Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM),... Read more »
Version 24H2 adds the sudo command and alerts users when an application accesses their physical location. Microsoft polished other security features, too. Read more »
