Latest episode – listen now. (And please leave us a review if you like what you hear!)Read More S3 Ep34: Apple bugs, scammers busted, and how crooks bypass 2FA [Podcast]
Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: risk-based cybersecurity produces proven results. The data shows that risk-based vuln…Read More Risk-based vulnerability management has produced demonstrable results
British police have arrested eight men in connection with a series of SIM-swapping attacks which saw criminals hijack the social media accounts of well-known figures and their families.
Read more in my article on the Tripwire State of Security blog.Read More Eight men arrested following celebrity SIM-swapping attacks