
Cybersecurity

China-based SMS Phishing Triad Pivots to Banks – Krebs on Security
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime…

Top 16 OffSec, pen-testing, and ethical hacking certifications
Red team careers are in high demand, with companies seeking professionals skilled in penetration testing, offensive security (OffSec), and ethical hacking. To stand out in a competitive job market, cybersecurity professionals should consider earning certifications that validate their expertise. Here’s a look at the top certifications for offensive security today, along with advice on how…

How to Prevent and Protect Against Ransomware | Informa TechTarget
The ransomware threat continues to plague organizations of all types and sizes. The SANS Institute reported a 73% increase in ransomware activity between 2022 and 2023, and Corvus Insurance identified 55 new ransomware groups in 2024. Preparation for a potential ransomware attack should be a priority. Take stock of existing cybersecurity controls and processes…

Industrial-strength April Patch Tuesday covers 135 CVEs
Microsoft on Tuesday released 135 patches affecting 19 product families. Ten of the addressed issues, all remote code execution issues, are considered by Microsoft to be of Critical severity, and 18 have a CVSS base score of 8.0 or higher. One, an Important-severity elevation of privilege issue touching the Windows Common Log File system driver,…

My information was stolen. Now what?
Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does as a call to arms, warning about the risks of running software downloaded from so-called “trusted sources” of pirated software. Of course, those files were anything but trustworthy and contained malware, such as ransomware or…

Agentic AI in the SOC – Dawn of Autonomous Alert Triage
Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many…

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe – Krebs on Security
A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI). Legal experts say the inquiry could be grounds to reopen a number of adjudicated cases in which the…

IPsec vs. SSL VPNs: What are the Differences?
Providing both individuals and sites secure remote access to internal resources is a priority for organizations of all sizes. Prior to the COVID-19 pandemic, VPNs were the go-to technology. Since then, zero-trust network access, secure service edge and other related technologies have taken the remote access spotlight, but VPNs haven’t gone away. In fact,…

Top 5 Web Application Penetration Testing Companies UK
Web Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can exploit them. This proactive process allows businesses to address security flaws early and maintain a…

Top Crypto Wallets of 2025: Balancing Security and Convenience
Crypto wallets offer an extra layer of security against malicious attacks targeting everyday users. It’s not always easy to open your online crypto account every time you want to make a payment, and many merchants still don’t support direct crypto transactions. That’s where digital wallets step in. They make payments easier, but in 2025, the…