Recent Investments in Cyber Security Firms

Recent Investments in Cyber Security Firms

Cybersecurity Market worth over $400 Bn by 2027 IBM to Acquire Randori for Attack Surface Management Tech Technology giant IBM has announced plans to acquire early-stage attack surface management startup Randori in a deal that signals a major expansion of Big Blue’s cybersecurity ambitions. Randori, a Boston area startup with a well-established reputation in the…

“We are actively working on the digital blockade of the Russian Federation.”

“We are actively working on the digital blockade of the Russian Federation.”

Palantir Technologies Inc. CEO Alex Karp, in the white shirt, speaks with Ukrainian President Volodymyr Zelenskyy, far right, and other officials June 2 in Kyiv. (Mykhailo Fedorov/Provided) Palantir’s Karp is first western CEO to visit Zelenskyy amid invasion WASHINGTON — The chief executive officer of Palantir Technologies Inc. quietly visited Ukraine this week, meeting with the country’s…

Russia, Ukraine and the Danger of a Global Cyberwar

Russia, Ukraine and the Danger of a Global Cyberwar

By Kevin Townsend on February 24, 2022 A conversation with Marcus Willett, former director of cyber at GCHQ On the morning of February 22, 2022, the world woke to the news that Russia had moved troops into two separatist regions of eastern Ukraine. At the time of writing, it is not yet a full invasion of Ukraine,…

Deadly Secret: Electronic Warfare Shapes Russia-Ukraine War

Deadly Secret: Electronic Warfare Shapes Russia-Ukraine War

By Associated Press on June 03, 2022 On Ukraine’s battlefields, the simple act of powering up a cellphone can beckon a rain of deathly skyfall. Artillery radar and remote controls for unmanned aerial vehicles may also invite fiery shrapnel showers. This is electronic warfare, a critical but largely invisible aspect of Russia’s war against Ukraine. Military commanders…

NSA TAO Chief on Disrupting Nation State Hackers

NSA TAO Chief on Disrupting Nation State Hackers

Rob Joyce, Chief, Tailored Access Operations, National Security Agency From his role as the Chief of NSA’s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce talks about the security practices and capabilities that most effectively frustrate people seeking to exploit networks. Rob Joyce began serving as the Chief of the National Security…

MacOS Being Picked Apart by $49 XLoader Data Stealer

MacOS Being Picked Apart by $49 XLoader Data Stealer

Cheap, easy and prolific, the new version of the old FormBook form-stealer and keylogger has added Mac users to its hit list, and it’s selling like hotcakes. There’s a new version of the old FormBook form-stealer and keylogger that’s added Mac users to its hit list, and it’s selling like hotcakes on underground markets for…

We Infiltrated a Counterfeit Check Ring! Now What?

We Infiltrated a Counterfeit Check Ring! Now What?

A counterfeit check image [redacted] that was intended for a person helping this fraud gang print and mail phony checks tied to a raft of email-based scams. One fraud-fighting group is intercepting hundreds to thousands of these per day. By Brian Krebs – Krebs on Security Imagine waking up each morning knowing the identities of…

How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown

How a Bitcoin Trail Led to a Massive Dark Web Child-Porn Site Takedown

Federal investigators focused not on offensive hacking efforts or surveilling communications, but on the transactions using cryptocurrency. The Department of Justice said today that it has taken down the massive dark web child-porn site Welcome to Video. The site generated and distributed exploitative content, and had infrastructure in place that could have supported up to…

Morphing computer chip repels hundreds of professional DARPA hackers

Morphing computer chip repels hundreds of professional DARPA hackers

Trying to hack the “unhackable” Morpheus system is described as like trying to solve a Rubik’s Cube that is constantly being rearranged [signature-free security!! — TJACK]   By Michael Irving May 24, 2021 Engineers have designed a computer processor that thwarts hackers by randomly changing its microarchitecture every few milliseconds. Known as Morpheus, the puzzling processor…

Der Aufstieg (und Abstieg?) der One Trick Ponys: Google & Facebook

Der Aufstieg (und Abstieg?) der One Trick Ponys: Google & Facebook

iOS 14.5 könnte sich für Werbenetzwerke als der befürchtete Albtraum herausstellen. Die neueste Version des Apple-Betriebssystems erlaubt es iPhone-Nutzer_innen, den Zugriff auf die Werbe-ID ihres Gerätes zu verhindern. Aktuell lassen Daten von Flurry Analytics zufolge weltweit nur 15 Prozent der iOS 14.5-Nutzer_innen Werbetracking zu, in den USA sind es sogar nur sechs Prozent. Angesicht eines…

Chrome dominiert den Browsermarkt

Chrome dominiert den Browsermarkt

12 APR 2021 Der Internet Explorer war mal die unangefochtene Nummer 1 unter den Browsern. Das ist mittlerweile aber eine ganze Weile her. 2012 wurde der Microsoft-Browser laut StatCounter von Chrome auf den zweiten Platz verdrängt und fiel seitdem immer tiefer. Schon 2015 reagierte das Unternehmen und brachte mit Edge einen neuen Webbrowser auf den…

By continuing to use this site, you agree to the use of cookies. Please consult the Privacy Policy page for details on data use. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close