You might be interested in …

[ThreatPost] Effective Threat-Hunting Queries in a Redacted World

All posts, ThreatPost

Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers’ infrastructure. Source: Read More (Threatpost)

Read More

[ZDNet] New offensive cyber force will “confront aggressive behaviour”, says Foreign Secretary

All posts, ZDNet

The National Cyber Force will work out of Lancashire, bringing together staff from the MoD, GCHQ and MI6 to counter cyber threats – and launch offensive operations. Source: Read More (Latest topics for ZDNet in Security)

Read More

[ThreatPost] Critical Jira Flaw in Atlassian Could Lead to RCE

All posts, ThreatPost

The software-engineering platform is urging users to patch the critical flaw ASAP. Source: Read More (Threatpost)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.