Beyond the Hack / September 2023
Blaze Information Security
Experts in offensive cybersecurity and penetration testing.
One more reason to start using password managers: Researchers from British universities have trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone.
How DEFCON hackers social engineered AI chatbots.
Chinese military hackers keep attacking Japan. Will it make the U.S. wary of sharing intelligence with its ally?
The Five Eyes nations - Australia, Canada, New Zealand, the U.K., and the U.S. have shared the most exploited CVEs in 2022. Attackers usually exploit known vulnerabilities within the first two years of public disclosure.
Cyber executives at Black Hat conference in Las Vegas last month argued that the west is struggling to replicate the collaborative methods that had proved successful in the conflict, which often include sharing sensitive or embarrassing information.
A long read from the Financial Times that tracks the origins of Russian-speaking cybercrime groups operating today, such as Cl0p.
Find out how to prepare for API assessments, what information to supply the pentesters with, which tools will be used, what is the ideal testing approach, most common security issues found in APIs, and more.
Learn about the latest requirements on penetration testing for Gramm-Leach-Bliley Act and how to increase your company's security posture.
领英推荐
Discover the ideal cyber insurance coverage, common exclusions to look out for, and what the insurers want to know about your security posture.
Read our comprehensive guide to penetration testing pricing and how to know whether your pentest provider is worth it.
London, UK / September 13, 2023
Hack the Hospital
Columbia, Maryland, US / September 18, 2023
Goa, India / September 23, 2023
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks, by Scott J. Shapiro, recommended by Julio Fort
From a worm released onto the world by a Cornell University student in 1988 to a Bulgarian virus factory to the 2016 Hilary Clinton email hacks, the events described in Shapiro's book shook the world at some point. Even if you are already acquainted with the stories, Shapiro provides enough detail and entertaining storytelling to keep you hooked. Fancy Bear Goes Phishing is an excellent read for both those familiar with cybersecurity and anyone wanting to understand the dark side of the internet.
Thank you for reading Beyond the Hack. As always, we welcome your feedback and questions. Your insights will help shape our content and ensure we're meeting the needs of your organization.
?
Being aware of threats is not enough, take action. Discover special offers, explore our services and find the right penetration testing solution for your organization's cybersecurity needs.