China-based SMS Phishing Triad Pivots to Banks – Krebs on Security

China-based SMS Phishing Triad Pivots to Banks – Krebs on Security

China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime…

Read More
Top 16 OffSec, pen-testing, and ethical hacking certifications

Top 16 OffSec, pen-testing, and ethical hacking certifications

Red team careers are in high demand, with companies seeking professionals skilled in penetration testing, offensive security (OffSec), and ethical hacking. To stand out in a competitive job market, cybersecurity professionals should consider earning certifications that validate their expertise. Here’s a look at the top certifications for offensive security today, along with advice on how…

Read More
My information was stolen. Now what?

My information was stolen. Now what?

Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does as a call to arms, warning about the risks of running software downloaded from so-called “trusted sources” of pirated software. Of course, those files were anything but trustworthy and contained malware, such as ransomware or…

Read More
Agentic AI in the SOC – Dawn of Autonomous Alert Triage

Agentic AI in the SOC – Dawn of Autonomous Alert Triage

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many…

Read More
IPsec vs. SSL VPNs: What are the Differences?

IPsec vs. SSL VPNs: What are the Differences?

Providing both individuals and sites secure remote access to internal resources is a priority for organizations of all sizes. Prior to the COVID-19 pandemic, VPNs were the go-to technology. Since then, zero-trust network access, secure service edge and other related technologies have taken the remote access spotlight, but VPNs haven’t gone away. In fact,…

Read More
Top 5 Web Application Penetration Testing Companies UK

Top 5 Web Application Penetration Testing Companies UK

Web Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can exploit them. This proactive process allows businesses to address security flaws early and maintain a…

Read More