Free “vCISO Clinic” offers Resource-Constrained InfoSec Leaders a Helping Hand
Leaders in the InfoSec field face a strange dilemma. On the one hand, there are hundreds of thousands of resources available to find online to read (or watch) if they…
Why Password Hygiene Needs a Reboot
In today’s digital world, password security is more important than ever. While biometrics, one-time passwords (OTP), and other emerging forms of authentication are often touted as replacements to the traditional…
Apple’s Find My Network Can be Abused to Exfiltrate Data From Nearby Devices
Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My Bluetooth” broadcasts…
Rapid7 source code, alert data accessed in Codecov supply chain attack
The breached source code subset was used for internal tooling. Read more from the Source
