On Chinese-Owned Technology Platforms
Schneier on Security
FEBRUARY 25, 2021
I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Schneier on Security
FEBRUARY 25, 2021
I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”
Lohrman on Security
JANUARY 15, 2023
What were the top government technology and security blogs in 2022? The metrics don’t lie, and they tell us what cybersecurity and technology infrastructure topics were most popular.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Lohrman on Security
JANUARY 14, 2024
What were the top government technology and security blogs in 2023? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
Lohrman on Security
JANUARY 9, 2022
What were the top government security blog posts in 2021? These metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.
Lohrman on Security
JANUARY 12, 2025
What were the top government technology and cybersecurity blog posts in 2024? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
Anton on Security
DECEMBER 10, 2021
SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Hence this blog was born. Let’s stick to mostly technology focused failures. SOC should not spend time / resources managing such technologies. Do They Matter?
Heimadal Security
APRIL 23, 2025
The patent, titled Apparatus and Method of Predicting […] The post Heimdal Awarded Patent for Predictive DNS Technology appeared first on Heimdal Security Blog. This milestone reinforces Heimdals position at the forefront of DNS security.
SecureBlitz
APRIL 17, 2025
SecureBlitz is recognized as one of the top 100 cyber security blogs on the web by FeedSpot! Due to the fast-paced world of cybersecurity, staying ahead of emerging threats, evolving technologies, and digital defense strategies is critical.
Jane Frankland
APRIL 25, 2025
But if we switch our focus to the world of technology, we seei a starkly different picturea landscape increasingly shaped by control, compliance, and automation. The rapid advancement of technology, particularly in AI and automation, is transforming the way we interact with the digital world.
Troy Hunt
NOVEMBER 13, 2024
Some people take the view of "I have nothing to hide", whilst others become irate if even just their email address is exposed.
Heimadal Security
NOVEMBER 6, 2024
LONDON, United Kingdom, 6 November 2024 – Heimdal, a leading provider of advanced cybersecurity solutions, and COOLSPIRiT, a UK-based expert in data management and IT infrastructure, are pleased to announce a strategic partnership to deliver cutting-edge security technologies to businesses across the UK.
Adam Shostack
JANUARY 2, 2025
Google calls attention to our Cyber Public Health work Last week, Bill Reid and Taylor Lehmann, both in the Office of the CISO at Google Cloud, wrote a blog post, Cyber Public Health: A new approach to cybersecurity. Im honored and grateful for their support, and appreciate being quoted.
Troy Hunt
JULY 6, 2021
Not for money, not for glory, but for the love of technology and for the joy of seeing it make a difference to people. Speak at a user group? This week marks the beginning of my 11th year as an MVP with the warmly awaited notification hitting my inbox this weekend.
Javvad Malik
APRIL 15, 2025
Now, I’m all for technological advancement. We’re using cutting-edge technology to solve a problem that wouldn’t exist if we used technology properly in the first place. I maybe out of a job if I wasn’t. This is like using a flamethrower to light a birthday candle. Look, I get it.
Heimadal Security
FEBRUARY 10, 2025
Complying with the regulation involves a combination of changes to workflows, employee behavior, and technology. There isnt a single turnkey solution that will make you compliant on […] The post 5 Best NIS2 Compliance Software and Solution Providers appeared first on Heimdal Security Blog.
Krebs on Security
APRIL 20, 2021
NYSE:IT ] — a $4 billion technology goliath whose analyst reports can move markets and shape the IT industry. As the largest organization dedicated to the analysis of software, Gartner’s network of analysts are well connected to the technology and software industries. Those enticements have mostly fallen on deaf ears.
Adam Shostack
FEBRUARY 14, 2025
The Human Factors track focuses on people in security: how their decisions can affect their security or the security of the organization, and how engineering and technology can help. It also includes new ways to strengthen technology and other solutions to decrease harm. In 2016, I wrote a short blog post on what we were looking for.
Krebs on Security
MAY 11, 2020
Diebold Nixdorf , a major provider of automatic teller machines (ATMs) and payment technology to banks and retailers, recently suffered a ransomware attack that disrupted some operations. So far, the crooks behind ProLock haven’t launched their own blog.
Krebs on Security
AUGUST 27, 2024
.” Those third-party reports came in late June 2024 from Michael Horka , senior lead information security engineer at Black Lotus Labs , the security research arm of Lumen Technologies , which operates one of the global Internet’s largest backbones. victims and one non-U.S.
Schneier on Security
AUGUST 15, 2023
On Monday, the company said in a blog post that there’s no need to worry about that. It’s a stupid way to run a technological revolution. This is why we need regulation: Zoom updated its Terms of Service in March, spelling out that the company reserves the right to train AI on user data with no mention of a way to opt out.
Krebs on Security
APRIL 20, 2023
3CX hired incident response firm Mandiant , which released a report on Wednesday that said the compromise began in 2022 when a 3CX employee installed a malware-laced software package distributed via an earlier software supply chain compromise that began with a tampered installer for X_TRADER , a software package provided by Trading Technologies.
Krebs on Security
APRIL 10, 2024
The domain mentioned at the beginning of this story — fedetwitter.com — redirects users to the blog of a Japanese technology enthusiast. A user with the handle “amplest0e” appears to have registered space-twitter.com , which Twitter/X users would see as the CEO’s “space-x.com.” com (webex.com).
Krebs on Security
OCTOBER 25, 2021
Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files stolen from victims may be published or sold. A redacted screenshot of the Conti News victim shaming blog.
Centraleyes
DECEMBER 16, 2024
As we approach 2025, the cybersecurity landscape is evolving rapidly, shaped by technological advancements, regulatory shifts, and emerging threats. By 2027, 75% of employees are expected to acquire or modify technology outside of ITs control, up from 41% in 2022. To keep up, organizations must stay ahead of these developments.
Security Boulevard
NOVEMBER 16, 2024
Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is often inevitable—it’s typically a question of when, not if.
Malwarebytes
NOVEMBER 4, 2024
In this blog post, we take a look at how criminals are abusing Bing and stay under the radar at the same time while also bypassing advanced security features such as two-factor authentication. The idea is about creating content that looks real, like a blog, but with malicious intent (monetization or other). com info-blog-news[.]com
Webroot
JANUARY 13, 2025
This ongoing evolution demands continuous investment in both training for an MSPs security team and the latest technologies to effectively detect and mitigate new types of threats. With advanced threat detection and remediation powered by SIEM and SOAR technology, it quickly spots and shuts down threats before they can do any damage.
Krebs on Security
NOVEMBER 4, 2022
“We may warn you about messages that ask you to take the conversation to another platform because that can be a sign of a scam,” the company said in a blog post. “These warnings will also give you the choice to report the content without letting the sender know.” A follow-up story on Oct.
Krebs on Security
MAY 18, 2022
In a letter to FTC Chair Lina Khan , the Senators charge that ID.me’s CEO Blake Hall has offered conflicting statements about how his company uses the facial scan data it collects on behalf of the federal government and many states that use the ID proofing technology to screen applicants for unemployment insurance.
Anton on Security
JUNE 17, 2022
Originally written for a new Chronicle blog. Admittedly many organizations don’t have a SOAR or comparable technology, so they fall outside of this visual. As security orchestration, automation and response (SOAR) adoption continues at a rapid pace , security operations teams have a greater need for a structured planning approach.
Schneier on Security
APRIL 9, 2024
The Board also concludes that Microsoft’s security culture was inadequate and requires an overhaul, particularly in light of the company’s centrality in the technology ecosystem and the level of trust customers place in the company to protect their data and operations.
Heimadal Security
APRIL 1, 2025
When I speak to NHS cybersecurity staff, one particular issue comes up time and again: technology fragmentation. appeared first on Heimdal Security Blog. IT staff at NHS trusts typically work with dozens of security point solutions to try and keep their environments secure. Why Agent Fatigue Makes It Worse?
Troy Hunt
NOVEMBER 2, 2020
I've had this blog post in draft for quite some time now, adding little bits to it as the opportunity presented itself. Ricky Gervais does an amazing job of explaining what I'm about to delve into so do yourself a favour and spend a minute watching this first: And therein lies the inspiration for the title of this blog.
Krebs on Security
APRIL 2, 2020
By far the largest group of companies exposing their Zoom meetings are in the technology sector, and include a number of security and cloud technology vendors. We need to look at the risk specific applications pose and help voice a message of how people can leverage technology and be safe. Image: SecKC. This is extreme.
The Last Watchdog
APRIL 22, 2025
As AI technology advances, attackers are shifting their focus from technical exploits to human emotions using deeply personal and well-orchestrated social engineering tactics. He holds a 2015 – 2016 Masters Degree in Security Technologies (MSST) @ Technological Leadership Institute, University of Minnesota.
Krebs on Security
MARCH 8, 2021
“We never got a ‘real’ confirmation of the zero-day before the patch was released,” said Dubex’s Chief Technology Officer Jacob Herbst. 29: Trend Micro publishes a blog post about “ Chopper ” web shells being dropped via Exchange flaws.
Troy Hunt
OCTOBER 28, 2020
Everything becomes clear(er) if I manually change the font in the browser dev tools to a serif version: The victim I was referring to in the opening of this blog post? Obviously, the image is resized to the width of paragraphs on this blog, give it a click if you want to check it out at 1:1 size.
Schneier on Security
OCTOBER 9, 2023
Reading the headlines, one would hope that the rapid gains in AI technology have also brought forth a unifying realization of the risks—and the steps we need to take to mitigate them. The technology historian David C. This group’s concerns are well documented and urgent—and far older than modern AI technologies.
Troy Hunt
FEBRUARY 25, 2025
I like to start long blog posts with a tl;dr, so here it is: We've ingested a corpus of 1.5TB worth of stealer logs known as "ALIEN TXTBASE" into Have I Been Pwned. They contain 23 billion rows with 493 million unique website and email address pairs, affecting 284M unique email addresses. Or find it unactionable noise?
Krebs on Security
NOVEMBER 10, 2020
It’s bad enough that many ransomware gangs now have blogs where they publish data stolen from companies that refuse to make an extortion payment. Fabian Wosar , chief technology officer at computer security firm Emsisoft , said some ransomware groups have become especially aggressive of late in pressuring their victims to pay up.
Krebs on Security
OCTOBER 20, 2023
BeyondTrust Chief Technology Officer Marc Maiffret said that alert came more than two weeks after his company alerted Okta to a potential problem. ET: Okta has published a blog post about this incident that includes some “indicators of compromise” that customers can use to see if they were affected. Update, 2:57 p.m.
Krebs on Security
DECEMBER 10, 2020
Conti is one of several cybercriminal groups that maintains a blog which publishes data stolen from victims in a bid to force the negotiation of ransom payments. The gang claims the data published so far represents just 15 percent of the information it offloaded from TSYS before detonating its ransomware inside the company. .
Anton on Security
JUNE 23, 2022
Three roads I see: CDR should exist as a technology and/or market : Cloud is a new realm for threat detection and so old tools/approaches are not ideal; so we need new tools that work well in this new realm. As you can see, I stole some ideas from my original EDR definition so that some useful similarities come out. I did NOT invent the term.
The Last Watchdog
MAY 20, 2022
Managed security services (MSS) refer to a service model that enable the monitoring and managing of security technologies, systems, or even software-as-a-service (SaaS) products. Enterprises that embrace IoT technologies to enhance end-user and employee experiences are likely to turn to MSS providers for quick and effective security […].
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content