Git is a distributed version control system that empowers developers with version control features and local repositories. In most production settings, Git is paired with a hosted service for distributed access with minimal repository configuration requirements. However, using a hosted… Read More "Don’t Git Attacked: How Git Protects Against Source Code Exposure"
NIS2 Compliance Checklist (Free) | UpGuard
In January 2023, the European Commission (EC) released an updated version of the European Union (EU) Network and Information Security Directive (NIS2) to strengthen cybersecurity risk management across Europe’s essential services. NIS2 updates the original NIS directive and focuses more… Read More "NIS2 Compliance Checklist (Free) | UpGuard"
.png?w=1140&resize=1140,855&ssl=1)
A Grim Outlook for Microsoft with MonikerLink and Exchange Vulnerabilities
Microsoft’s Patch Tuesday updates in February 2024 include critical fixes for two zero-day vulnerabilities: CVE-2024-21413 impacting Microsoft Outlook (called MonikerLink) and CVE-2024-21410 impacting Microsoft Exchange Server. The former allows remote code execution to access and leak privileged information, while the… Read More "A Grim Outlook for Microsoft with MonikerLink and Exchange Vulnerabilities"

A Guide to New Zealand’s Cybersecurity Standards
In an age of increasingly complex cyber threats, New Zealand has implemented robust cybersecurity standards to secure the online environment for individuals, businesses, and government entities. New Zealand’s cybersecurity approach is unique and effective, from the overarching strategies laid out… Read More "A Guide to New Zealand’s Cybersecurity Standards"

China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers
When the Chinese hacker group known as Salt Typhoon was revealed last fall to have deeply penetrated major US telecommunications companies—ultimately breaching no fewer than nine of the phone carriers and accessing Americans’ texts and calls in real time—that hacking… Read More "China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers"
%20(1).png?w=1140&resize=1140,855&ssl=1)
TSSR: Protecting Australian Telecos Against Cyber Threats
The telecommunications sector provides critical infrastructure for many countries, enabling the exchange of information across various industries. Due to the widespread use of digital information in teleco, the sector has become a prime target for cyber threats from hackers, state… Read More "TSSR: Protecting Australian Telecos Against Cyber Threats"

The Loneliness Epidemic Is a Security Crisis
UTA’s Wang notes that while she hasn’t assessed whether scammers are using generative AI to produce romance scam scripts, she is seeing evidence that they are using it to produce content for online dating profiles. “I think it is something… Read More "The Loneliness Epidemic Is a Security Crisis"

Cyber Security Report Examples (3 Common Styles)
Cyber security reports are an invaluable tool for keeping stakeholders and senior management informed about your cyber security efforts. This post outlines examples of some of the most popular reporting styles, with a particular focus on a field of cybersecurity… Read More "Cyber Security Report Examples (3 Common Styles)"

The Trump Administration Is Deprioritizing Russia as a Cyber Threat
As scam compounds in Southeast Asia continue to drive massive campaigns targeting victims around the world, WIRED took a deeper look at how Elon Musk’s satellite internet service provider Starlink is keeping many of those compounds in Myanmar online. Meanwhile,… Read More "The Trump Administration Is Deprioritizing Russia as a Cyber Threat"

How to Fix Your Domain Name Registrar Issues
Your domain is the route that all users, including your current and prospective customers, take to access your organization on the internet. While your actual system is set up with server IP addresses likely in a cloud environment, your users… Read More "How to Fix Your Domain Name Registrar Issues"