10 Lessons in Security Operations and Incident Management
This post outlines 10 lessons learned from more than three decades of building incident response and security teams throughout the globe.
Read MoreThis post outlines 10 lessons learned from more than three decades of building incident response and security teams throughout the globe.
Read MorePositive deterrence reduces insider risk through workforce practices that promote the mutual interests of employees and their organization.
Read MoreCapturing and sharing information about insider incidents is a challenge. This post introduces the Insider Incident Data Exchange Standard (IIDES) schema for insider incident data collection.
Read MoreThe recent (and still ongoing) phishing of NPM developer accounts showed yet again that even...
Read MoreToday, as expected, Apple released iOS/iPadOS/macOS/watchOS/tvOS 26. Going forward, Apple will adopt the same OS number across its different offerings, setting us up for a potential year 2100 issue. Notably, VisionOS was not...
Read MoreJohannes wrote a diary entry “Increasing Searches for ZIP Files” where he analyzed the increase of requests for ZIP files (like backup.zip, web.zip, …) for our web honeypots. I took a look at my logs, and...
Read MoreOverview LangChainGo, the Go implementation of LangChain, a large language model (LLM) application building framework, has been discovered to contain an arbitrary file read vulnerability. The vulnerability, tracked as...
Read MoreSince the last update [5], over the past few months I added several enhancements to DShield SIEM...
Read MoreOverview Two local security vulnerabilities have been identified in Sunshine for Windows, version v2025.122.141614 (and likely prior versions). These issues could allow attackers to execute arbitrary code and escalate privileges...
Read MoreThe Lab-Based Drug Checking Standards Meeting is a two-day event designed to bring together scientists involved in lab-based drug checking, specifically for public health applications. In this meeting we will discuss current...
Read MoreAs part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were...
Read MoreOverview The Amp’ed RF BT-AP 111 Bluetooth Access Point exposes an HTTP-based administrative interface without authentication controls. This allows an unauthenticated remote attacker to gain full administrative access to the...
Read More