• img August 14, 2018

Connecting the dots to North Korea as a threat adversary

Reports of malware campaigns invariably focus on two critical conclusions: attribution and who was the intended target of the attack. It is challenging to draw swift conclusions on the former, due to the use of false flags designed to divert attention from the true source of the attack. Those swift conclusions are modified as more […]

Read More
  • img August 14, 2018

ThreatList: Almost All Security Pros Believe Election Systems Are at Risk

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/threatlist-almost-all-security-pros-believe-election-systems-are-at-risk/

Read More
  • img August 14, 2018

Three A’s of SaaS adoption, and why every company goes through them

I’ve noticed that as more and more companies turn to SaaS applications to power their business, they all experience the same journey along the way, more or less. Everyone goes through what I call “the 3 A’s of SaaS adoption”: aggravation, acceptance, and adoption. Companies go through distinct stages of SaaS adoption. As your SaaS […]

Read More
  • img August 14, 2018

10,644 vulnerabilities disclosed in the first half of 2018

There have been 10,644 vulnerabilities disclosed through June 30th, according to Risk Based Security’s 2018 Mid Year VulnDB QuickView report. This is the highest number of disclosed vulnerabilities at the mid-year point on record. The 10,644 vulnerabilities cataloged during the first half of 2018 by Risk Based Security’s research team eclipsed the total covered by […]

Read More
  • img August 14, 2018

Five key security tips to avoid an IoT hack

Recently, Russian PIR Bank lost $1,000,000 because of a compromised router that allowed hackers to gain entry into their local network. Why did it happen and how companies can protect themselves? Malicious IoT hacking incidents are a norm today. That is not surprising, considering that by 2020, the IoT is expected to reach a staggering […]

Read More