2nd Edition

Tracking the trends and news for IT and IT Security

  • Twitter
  • SOC News

    Abnormal Security Shares Examples of Attacks Using Generative AI

    Abnormal Security Shares Examples of Attacks Using Generative AI>Security Boulevard – Michael VizardAbnormal Security has highlighted how cybercriminals are adopting generative AI to orchestrate cyberattacks, […]

    January 16, 2024

    Paul Davis

  • SOC News

    Tego Cyber Inc. Appoints Interim Chief Executive Officer

    Tego Cyber Inc. Appoints Interim Chief Executive Officer>Finanznachrichten.de – ACCESSWIRELAS VEGAS, NV / ACCESSWIRE / January 3, 2024 / Tego Cyber Inc. (OTC PINK:TGCB), a […]

    January 16, 2024

    Paul Davis

  • SOC News

    Why businesses must move from outdated SOCs to attack disruption in combatting modern threat actors

    Why businesses must move from outdated SOCs to attack disruption in combatting modern threat actors>Data Center Solutions – Dominic CarrollThe article highlights the importance of […]

    January 16, 2024

    Paul Davis

  • SOC News

    DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic arti…

    DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic arti…>Help Net Security – Mirko ZorzDriveFS Sleuth is an open-source tool designed to […]

    January 16, 2024

    Paul Davis

  • SOC News

    Creating a digital cyber investigations team? | by Duncan Proffitt | Dec, 2023 |

    Creating a digital cyber investigations team? | by Duncan Proffitt | Dec, 2023 |Medium – Duncan ProffittIntegrating a multifaceted, multidisciplinary team within the broader security […]

    January 16, 2024

    Paul Davis

  • SOC News

    British Library could take months to completely recover from Rhysida ransomware attack

    British Library could take months to completely recover from Rhysida ransomware attackTEISS – The key details are: – The British Library suffered a ransomware attack […]

    January 16, 2024

    Paul Davis

  • SOC News

    LogRhythm announces new integration and case management tools for security teams

    LogRhythm announces new integration and case management tools for security teams>Silicon Angle – Duncan RileyThe key details are: – LogRhythm announced innovations to prioritize speed […]

    January 16, 2024

    Paul Davis

  • SOC News

    Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack

    Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack>Sonatype Blog – lkka TurunenThe key details are: – Ledger discovered malicious code […]

    January 16, 2024

    Paul Davis

  • SOC News

    Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Comp…

    Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Comp…>Tech Republic – Cedric PernetThe key points are: – Proofpoint exposed a social engineering […]

    January 16, 2024

    Paul Davis

  • SOC News

    Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

    Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malwareThe Register – Connor JonesThe key points are: – Researchers uncovered novel […]

    January 16, 2024

    Paul Davis

←Newer Posts Older Posts→

Categories


  • AI / ML
  • AIOps
  • IT/OT News
  • Open Source
  • Security Industry News
  • Security Strategy News
  • SOC News
  • Zero Trust

Recent Posts


  • Cybersecurity Threat Landscape and 2026 OutlookJanuary 11, 2026
  • Cyber Resilience and Software EscrowJanuary 11, 2026
  • AI & Humans: Making the Relationship Work – Schneier on SecurityJanuary 11, 2026
  • How AI is Streamlining the Underwriting Process for the Insurance IndustryJanuary 11, 2026

Tags


2nd Edition

Boston, USA

Pages

Links

F.A.Q.

Terms and Conditions

Support

Social

Twitter