Search This Blog
Cybersecurity, cyber crisis management, and threat intel professional. Speaker, author, strong advocate for women in cybersecurity. I use my expertise and voice to provide counsel to CSOs, CISOs, and CIOs at the world’s largest corporations and governments. Volunteering: RSA Conference Hackers & Threats, Your Everyday Cyber Podcast, TLV U Interdisciplinary Cyber Research Ctr, WiCys speaker, SC Media Women in Security Awards committee, BSIDES, OWASP, Wizer security, Cyber Together.
Posts
XMRig: Father Zeus of Cryptocurrency Mining Malware?
- Get link
- X
- Other Apps
TrickBot’s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets
- Get link
- X
- Other Apps
Necurs Spammers Go All In to Find a Valentine’s Day Victim
- Get link
- X
- Other Apps
IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity
- Get link
- X
- Other Apps
CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data
- Get link
- X
- Other Apps
Ursnif v3 Emerges, Targets Australian Bank Customers With Redirection Attacks
- Get link
- X
- Other Apps
Managing Security Risk in the Face of Intel ME Vulnerabilities
- Get link
- X
- Other Apps
Canadian Business Banking Customers Hit With Targeted Phishing, Account Takeover Attacks
- Get link
- X
- Other Apps
New Banking Trojan IcedID Discovered by IBM X-Force Research
- Get link
- X
- Other Apps
Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection
- Get link
- X
- Other Apps
Massive Identity Data Exposure Leads to Rising Tides of New Account Fraud — What’s Next?
- Get link
- X
- Other Apps