Remember, remember the fifth of November - Welcome to this week’s edition of the Threat Source newsletter. Ever heard the phrase in ... #threatsourcenewsletter
How a ransomware gang encrypted Nevada government's systems - The State of Nevada has completed its recovery from a ransomware attack it suffered on Au... #government #security
I'm Hosting a New Podcast -  I'm hosting a new podcast for Corelight. Check out my first episode with our fiel... #corelight
“Pay up or we share the tapes”: Hackers target massage parlour clients in blackmail scheme - South Korean police have uncovered a hacking operation that stole sensitive data from mas... #databreach #southkorea #guestblog #lawℴ #blackmail #dataloss #malware
The rising tide of cyber attacks against the UK water sector - Critical infrastructure is once again in the spotlight, as it is revealed that several UK... https://www.fortra.com/blog/rising-tide-cyber-attacks-against-uk-water-sector #securitythreats #watersupply #guestblog
Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense - Red and blue teams often operate independently, but attackers don't. Picus Security shows... #security
ClickFix malware attacks evolve with multi-OS support, video tutorials - ClickFix attacks have evolved to feature videos that guide victims through the self-infec... #security
Simplifying identity security queries with AI - ... #product&engineering
Critical Cisco UCCX flaw lets attackers run commands as root - Cisco has released security updates to patch a critical vulnerability in the Unified Cont... #security
Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators - Time itself comes under attack as a state-backed hacking gang spends two years tunnelling... https://grahamcluley.com/smashing-security-podcast-442/ #smashingsecurity #ransomware #lawℴ #malware #podcast #china #nsa