For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows and other networks, it’s also convenient for attackers.
Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security wrong. How could you know that your expensive defenses are working unless you’ve tested them out?
Cryptocurrency startups are still all the rage these days, but many of these companies have had a "break rules first, settle lawsuits later" approach to operating.
Stealing credit card number? Old hat. Ransoming information? Been there, done that. Apparently, if you want to make real money from hacking (not that we’re suggesting this), press releases are the latest and most lucrative piece of valuable information.
Did you ever have a Google Plus account? Neither did we, but a few people did, and most of their information just got leaked in a bug that affected 500,000 people. As a result, the search giant has shut their social media experiment down. Gone doesn’t mean forgotten however, and it turns out that even though Google Plus has been deleted, Google itself has been facing scrutiny about what led to the bug that finally killed it.
When you type a URL into the top of your browser and hit “enter,” a number of complicated things begin to happen. Somehow, the alphanumeric English language of a URL gets translated into the machine language of an IP address, allowing your browser to resolve a new webpage.