Tag: Mapping
-
Fake Alpine Quest Mapping App Spotted Spying on Russian Military
Fake Alpine Quest app laced with spyware was used to target Russian military Android devices, stealing location data, contacts, and …
-
From ISO to NIS2 – Mapping Compliance Requirements Globally
The global regulatory landscape for cybersecurity is undergoing a seismic shift, with the European Union’s NIS2 Directive emerging as a …
-
Security in depth with Ubuntu: Mapping security primitives to attacker capabilities
Cybersecurity is not about perfection. In fact, it’s more like a game of …
-
Security in depth with Ubuntu Mapping security primitives to attacker capabilities
Cybersecurity is not about perfection. In fact, it’s more like a game of …
-
Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code
Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at …
-
CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool
A threat actor that was previously observed using an open-source network mapping tool has greatly expanded their operations to infect over …
-
4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets
You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are …
-
Searchlight Cyber integrates MITRE ATT&CK Mapping into DarkIQ for dark web monitoring
Searchlight Cyber has integrated the MITRE ATT&CK Enterprise Framework into its dark web monitoring solution, DarkIQ. Aligning actionable …
-
Mapping attacks on generative AI to business impact
If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that …
-
Network Architecture Mapping Improves Security Posture and Saves Big Bucks
By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network, …
-
Tentacle AI Control Mapping enables organizations to centralize security information
Tentacle AI Control Mapping; a machine learning and natural language processing-fueled feature expected to transform an organization’s …
-
CBP Is Expanding Its Surveillance Tower Program at the U.S.-Mexico Border–And We’re Mapping It
To provide researchers with the tools they need to analyze the impact of U.S. border security policy, EFF is releasing a new map and …
●●●