Articles By This Author

News

Toolkit To Hide and Execute Malicious Code on Nvidia, AMD and Intel Graphics Cards Sold by a Hacker Online

Threat actors discovered a method to hide and execute code from computer graphics cards to avoid detection. Bleeping Computer reported that a threat actor on an underground hacker

News

Australian Privacy Watchdog Looks to Ban Police From Accessing Contact Tracing Data for Unrelated Investigations

Australia has made news for having some of the world’s strongest anti-Covid measures, but the country’s lead privacy watchdog wants to ensure that this extraordinary

News

ICS Cybersecurity Report Notes Overall Improvements to Industrial Security Posture but 48% Of Organizations Unsure if They’ve Been Breached

The 2021 edition of the SANS 2021 OT/ICS Cybersecurity Report from Nozomi Networks confirms that threats to industrial operations are rising both in number and

News

UK ICO Commissioner’s Plan To Address “Endless” Cookie Popups Resembles Browser “Do Not Track” Initiatives

The United Kingdom has announced that it plans to take a “balanced” and more business-friendly approach to the regulation of personalized ad tracking in the

News

The Rise of Software “Machines” Requires a New Type of Identity Management

For many years, the technology industry has been working on ways to verify people when they do business online, with passwords and multi-factor authentication. With

News

43% Of Security Practitioners Believe They Are Overpaying for Their SIEM

Anyone that spends much time talking with security professionals about what keeps them up at night soon learns that one of those things is the

News

ProxyToken Authentication Bypass Flaw Allows Hackers To Copy Victims’ Emails on Vulnerable Microsoft Exchange Servers

Security researcher Le Xuan Tuyen discovered a Microsoft Exchange server bug that allows threat actors to access user’s emails through an authentication bypass flaw. Dubbed ProxyToken, CVE-2021-33766 allows

News

Navigating Consumer Data Privacy: Four Ways To Provide Relevance, Personalization, and Privacy in the New World

Apple’s App Tracking Transparency and growing restrictions on web third-party cookies are part of the global trend protecting consumer privacy, but it is also impacting

News

Australian Police Now Empowered to Hack and Spy on Cybercriminals, Despite Failure To Pass Key Safeguard Measures

A new system of warrants grants Australian police broad powers to infiltrate and even modify the online accounts of suspected cybercriminals, in the name of

News

Enterprise-Grade Security Starts With Enterprise-Grade Development

Cyber attacks and data breaches are becoming more and more intricate by the day. As a way to mitigate risk, companies have gone to great