Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.
from Dark Reading https://ift.tt/32Qf0e5
via IFTTT
Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.
from Dark Reading https://ift.tt/32Qf0e5
via IFTTT
We deconstructed a copyright phish so you don’t have to. Be warned: the crooks are getting better at these scams…
from Naked Security https://ift.tt/3FIIZTx
via IFTTT
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it’s far from a perfect strategy.
from Dark Reading https://ift.tt/3sKKLjm
via IFTTT

KrebsOnSecurity.com celebrates its 12th anniversary today! Maybe “celebrate” is too indelicate a word for a year wracked by the global pandemics of COVID-19 and ransomware. Especially since stories about both have helped to grow the audience here tremendously in 2021. But this site’s birthday also is a welcome opportunity to thank you all for your continued readership and support, which helps keep the content here free to everyone.
More than seven million unique visitors came to KrebsOnSecurity.com in 2021, generating some 12 million+ pageviews and leaving almost 8,000 comments. We also now have nearly 50,000 subscribers to our email newsletter, which is still just a text-based (non-HTML) email that goes out each time a new story is published here (~2-3 times a week).
Back when this site first began 12 years ago, I never imagined it would attract such a level of engagement. Before launching KrebsOnSecurity, I was a tech reporter for washingtonpost.com. For many years, The Post’s website was physically, financially and editorially separate from what the dot-com employees affectionately called “The Dead Tree Edition.” When the two newsrooms finally merged in 2009, my position was eliminated.
Happily, the blog I authored for four years at washingtonpost.com — Security Fix — had attracted a sizable readership, and it seemed clear that the worldwide appetite for in-depth news about computer security and cybercrime would become practically insatiable in the coming years.
Happier still, The Post offered a severance package equal to six months of my salary. Had they not thrown that lifeline, I doubt I’d have had the guts to go it alone. But at the time, my wife basically said I had six months to make this “blog thing” work, or else find a “real job.”
God bless her eternal patience with my adopted occupation, because KrebsOnSecurity has helped me avoid finding a real job for a dozen years now. And hopefully they let me keep doing this, because at this point I’m certainly unqualified to do much else.
I’d be remiss if I didn’t take this opportunity to remind Dear Readers that advertisers do help keep the content free here to everyone. For security and privacy reasons, KrebsOnSecurity does not host any third-party content on this site — and this includes the ad creatives, which are simply images or GIFs vetted by Yours Truly and served directly from krebsonsecurity.com.
That’s a long-winded way of asking: If you regularly visit KrebsOnSecurity.com with an ad blocker, please consider adding an exception for this site.
Thanks again, Dear Readers. Please stay safe, healthy and alert in 2022. See you on the other side!
from Krebs on Security https://ift.tt/3pBiYzY
via IFTTT
It’s a Log4j bug, and you ought to patch it. But we don’t think it’s a critical crisis like the last one.
from Naked Security https://ift.tt/3ExRz6d
via IFTTT
That announcement may feel good, but if your prospective acquisition’s cybersecurity levels are substandard, it might be best to hold off.
from Dark Reading https://ift.tt/3zaSmJb
via IFTTT
Don’t think of zero trust as a product. Think of it as “how you actually practice security.”
from Dark Reading https://ift.tt/3sDxF7H
via IFTTT
Over 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google’s Open Source Insights Team.
from Dark Reading https://ift.tt/3z4vafT
via IFTTT
Over 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google’s Open Source Insights Team.
from Dark Reading https://ift.tt/3z4vafT
via IFTTT
To comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.
from Dark Reading https://ift.tt/32FRXTc
via IFTTT