Vulnerability ManagementVulnerable instances of Log4j still being used nearly 3 years laterDan RaywoodOctober 14, 2024Critical vulnerabilities take over 500 days to be fixed.
RansomwareParis Olympics deals with ransomware attackDan RaywoodAugust 9, 2024Attack hit a computer system which handles data for 40 museums.
Critical Infrastructure SecurityCrowdStrike confirms faulty update is tied to massive global IT outage: ‘Fix has been deployed’Dan RaywoodJuly 19, 2024Transport, broadcasters, and financial systems reportedly affected by Microsoft outage.
RansomwareVictims of cyber extortion and ransomware increase in 2024Dan RaywoodJuly 8, 2024Ransomware victims can be hit multiple times by affiliate gangs in "re-victimization."
AI/MLGenAI an enhancement for cyberattackers and defendersDan RaywoodJune 13, 2024Perception Point official says the “highest bar is full automation of the attack process.”
RansomwareSecurity industry has ransomware-as-a-service model wrong, says expertDan RaywoodJune 6, 2024BitDefender research demonstrates RaaS model of operators and affiliates.
Incident ResponseDanger within: The inside threatDan RaywoodOctober 1, 2013Every business faces the possibility of external attacks, but another potential threat is on the premises, reports Dan Raywood.
Threat ManagementFacebook detail harvest not security issueDan RaywoodJuly 30, 2010A security consultant said that he collected and published the names of one fifth of Facebook's global user base as part of his work on a security tool.
Security ArchitectureMcAfee to acquire mobile security companyDan RaywoodJuly 30, 2010McAfee has entered into a definitive agreement to acquire tenCube to add to the service acquired in the Trust Digital deal.
ContentPresident Obama greets new cybersecurity chiefDan RaywoodDecember 23, 2009The appointment of President Obama's new cybersecurity coordinator, Howard Schmidt, has drawn mostly favorable assessments.