Das ist die Essenz dessen, was ich als “Moschusochsenstrategie” bezeichne. Der Hintergrund: Werden Moschusochsen von Wölfen…
The CSO guide to top security conferences
Blue Team Con 2024, Chicago, Illinois: 4-7 September Gartner IT Symposium/Xpo, Queensland, Australia: 8-11 September 16th…
Social media platforms marketers should watch in 2025
Three years ago, if you’d asked Kasey Brown, founder and CEO of Different Breed Media, she’d…
Lead form best practices for capturing high-quality prospects
When I was first setting up my freelance business website, I read tons of articles and…
AI agents for marketing — I talked to experts about the benefits
I love the Back to the Future series, especially Part II where we see “the future.”…
The Solidity Language open-source package was used in a $500,000 crypto heist
Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of…
What is UserAssist and how to use it in IR activities?
Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on…
GhostContainer backdoor for Exchange servers
In a recent incident response (IR) case, we discovered highly customized malware targeting Exchange infrastructure within…
Kaspersky industrial threat report for Q1 2025
Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects…
Coinbase is the best-performing stock in the S&P 500 in June, and may have even more room to run
People watch as the logo for Coinbase, the biggest U.S. cryptocurrency exchange, is displayed on the…