shirelywang

How to Embrace a Powerful Password Paradigm _seirim.com
| posted by shirelywang in : research | No comments |
1

Collection of all Top Open Source Cybersecurity Tools _seirim.com
| posted by shirelywang in : products_and_services | No comments |
1

RANSOMWARE PREVENTION 101 _seirim.com
| posted by shirelywang in : research | No comments |
1

A 'Colossal' Ransomware Attack Hits Hundreds Of U.S. Companies, A Security Firm Says _npr.org
| posted by shirelywang in : attacks | No comments |
1

“I’m totally screwed.” WD My Book Live users wake up to find their data deleted _arstechnica.com
| posted by shirelywang in : attacks | No comments |
1

100 Point Cybersecurity Checklist _seirim.com
| posted by shirelywang in : research | No comments |
1

Hackers use Colonial pipeline ransomware news for phishing attack _zdnet.com
| posted by shirelywang in : attacks | No comments |
1

This is not a drill: VMware vuln with 9.8 severity rating is under attack _arstechnica.com
| posted by shirelywang in : attacks | No comments |
1

Hackers Breached Colonial Pipeline Using Compromised Password _bloomberg.com
| posted by shirelywang in : attacks | No comments |
1

Impact of Ransomware Attack on Mass. Steamship Authority Expected to Continue Thursday _nbcboston.com
| posted by shirelywang in : attacks | No comments |
1

How to Negotiate with Ransomware Hackers _newyorker.com
| posted by shirelywang in : incident_response | No comments |
1

World's largest meat supplier grinds to a halt after cyberattack _theverge.com
| posted by shirelywang in : attacks | No comments |
1

Biden Administration taking Cybersecurity Seriously in 2021 _verdict.org
| posted by shirelywang in : government | No comments |
1

Colonial Pipeline cyberattack shuts down pipeline that supplies 45% of East Coast's fuel | ZDNet _zdnet.com
| posted by shirelywang in : attacks | No comments |
1

New technology has enabled cyber-crime on an industrial scale _economist.com
| posted by shirelywang in : threats | No comments |
1

How China turned a prize-winning iPhone hack against the Uyghurs _technologyreview.com
| posted by shirelywang in : privacy | No comments |
1

Man-in-the-middle attack: Real-life example and video walkthrough _resources.infosecinstitute.com
| posted by shirelywang in : workplace | No comments |
1

Ransomware by the numbers: Reassessing the threat’s global impact _securelist.com
| posted by shirelywang in : research | No comments |
1

APT annual review: What the world’s threat actors got up to in 2020 _securelist.com
| posted by shirelywang in : research | No comments |
1

theHarvester: a Classic Open Source Intelligence Tool _securitytrails.com
| posted by shirelywang in : workplace | No comments |
1

Zeus Botnet RAT Download 2021 - #1 Remote Administration Tool _securedyou.com
| posted by shirelywang in : research | No comments |
1

Data Breaches Caused by Third Parties with Remote Access Affect 51% of Organizations _heimdalsecurity.com
| posted by shirelywang in : corporate | No comments |
1

This is why smart cities projects might be the most dangerous ecosystems _cybertalk.org
| posted by shirelywang in : research | No comments |
1

HIPAA vs. ISO 27001: What are the differences? _advisera.com
| posted by shirelywang in : workplace | No comments |
1

Windows Defender bug creating thousands of files on Windows 10 systems _betanews.com
| posted by shirelywang in : products_and_services | No comments |
1