What misconfigurations did ethical hackers run into the most this year?
“The weakest link is still the person. It’s still the employee,” Kent Ickler tells IT Brew.
“The weakest link is still the person. It’s still the employee,” Kent Ickler tells IT Brew.
Red teamers are hired to craftily break in. Are our adversaries doing the same?
Including compromises of TV stations, school sprinklers, and oil tankers.
Joe Hennes, owner and editor-in-chief of Muppets fan website ToughPigs, says stray code on the backend of his website led to repeated cyberattack attempts over the years.
GenAI, internet-connected door locks, and even regular ol’ stop signs.
A study found plenty of “starter” passwords in a pile of compromised credentials.
ZDI’s Dustin C. Childs describes the complicated excitement of hacking today’s cars.
From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.