Emotet Evolution: Banking Trojan Still Popular
For malware to continue to be relevant in the market and being used in one form or another there has to be an aspect that continues to be...
Lessons Learned from Uber’s Data Breach
Uber, the ride sharing company, recently announced a massive data breach that occurred in 2016, but ignored notifying the victims. The...
Message for the DoD: Security, It's Not just for Operations
Data comes in all forms and sizes. The composition of this also varies greatly dependent on the data owner. One actionable items...
Pertinent Log Management
In recent history there have been rather extensive and significant breaches affecting millions of people. This action has provided...
‘Tis the season…
Seemingly every year about this time, the phishing campaigns are presented to the consumers. The phishing emails have taken various forms...
SHA-1 still in use...
In May 2017, IE and Microsoft Edge finally began to note the SSL/TLS certificates signed with the well-used SHA-1 hashing protocol as...