How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™

“The art of communication is the language of leadership.” — James Humes, former Presidential speechwriter and author.  Cybersecurity teams face adversaries who thrive in chaos. Attackers move fast, automate, and strike where defenses are weakest. In a borderless digital world, disruption is constant, driven by innovation, complexity, and the pressure to move faster, often at…

Read More

Iranian Educated Manticore Targets Leading Tech Academics

Key findings Amid ongoing tensions between Iran and Israel, the Iranian threat group Educated Manticore, associated with the Islamic Revolutionary Guard Corps, has launched spear-phishing campaigns targeting Israeli journalists, high-profile cyber security experts and computer science professors from leading Israeli universities. In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who…

Read More

New Release: Tor Browser 14.5.4

Tor Browser 14.5.4 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog…

Read More

Scans for Ichano AtHome IP Cameras

Ichano’s “AtHome Camera” is a bit of a different approach to home surveillance cameras [1]. Instead of a hardware camera solution, this product is a software solution that turns existing devices like computers and tablets into webcams. The software implements features we know from similar IP camera devices. It enabled streaming of images and remote…

Read More