In my previous blog post, I talked about the TAB ATTA & CK and how it can help you determine possible threats and threat actor techniques so you can better focus your limited resources on the most likely threats. The next question you might ask yourself is, “Am I being attacked?” And “Are my defenses […]
According to the Ipass lender security firm, hackers used a pricing mechanism to deceive the protocol in a “flash loan” assault that resulted in the loss of user funds. The crypto derivatives site Deus Finance was abused for more than $3 million worth of cryptocurrency in the early European morning hours of Tuesday, according to […]
Pictured: Visitors attend the CeBIT 2017 technology fair on March 20, 2017 in Hannover, Germany. Today’s columnist, Rod Stuhlmuller of Aviatrix, explains how cloud security differs from legacy on-premises security. (Photo by Alexander Koerner/Getty Images) Legacy network security designs leveraged data center and campus network architectures that had few well-known traffic entry and exit points […]