Apple's Wi-Fi Positioning System (WPS) can be used to map and track Wi-Fi access points (APs) around the globe. But in a presentation at Black Hat 2024, University of Maryland researcher Erik Rye will demonstrate how he mapped hundreds of millions of APs in a matter of days, without even needing an Apple device or […]
Read More →Cyber-Insurance Prices Plummet as Market Competition Grows Cyber-Insurance Prices Plummet as Market Competition Grows
July 8, 2024
A steady decline in premium rates over the past year has made it more affordable than ever for organizations of all sizes to acquire cyber-insurance coverage. Much of the decline is the result of a more competitive marketplace in which many more insurance companies than even two years ago have begun offering coverage for cybersecurity […]
Read More →5 Ways to Run Security as a Meritocracy 5 Ways to Run Security as a Meritocracy
July 8, 2024
I remember watching the space shuttle Challenger launch as a child. The launch was highly anticipated, and my fellow classmates and I gathered in the school cafeteria to watch the one television that had been placed there and connected to broadcast signals. In 73 seconds, wonder turned to amazement, which turned to confusion, which turned […]
Read More →Deconstructing Security Assumptions to Ensure Future Resilience Deconstructing Security Assumptions to Ensure Future Resilience
July 8, 2024
COMMENTARY Second of two parts. (Read Part 1: "Stress-Testing Our Security Assumptions in a World of New & Novel Risks.") Achieving security in a future of "unseen until it's too late" threats forces us to look beyond the endless cycles of discover and patch, identify and neutralize, and sense and respond, to build resilience by […]
Read More →‘CloudSorcerer’ Leverages Cloud Services in Cyber-Espionage Campaign ‘CloudSorcerer’ Leverages Cloud Services in Cyber-Espionage Campaign
July 8, 2024
A new cyber-espionage actor is targeting government organizations in the Russian Federation with a sophisticated piece of malware that can adapt its behavior based on its execution environment. The advanced persistent threat (APT) group, which researchers at Kaspersky are tracking as "CloudSorcerer," has an operational style that is akin to that used by "CloudWizard" another […]
Read More →