Skip to content

Don Hackman

InfoSec, cloud and dev

Tag Archives: security

Avoid these CSPM mistakes to increase your cloud security posture – Help Net Security

CSPM doesn’t have to be a major challenge or a puzzle, but it does take some deliberate planning, and buy-in from the organization. — Read on http://www.helpnetsecurity.com/2021/04/27/cspm-cloud-security-posture-management/

Posted byDon HackmanApril 28, 2021Posted inInfoSecTags:securityLeave a comment on Avoid these CSPM mistakes to increase your cloud security posture – Help Net Security

PSA:Hackers Exploit 0-Day Gatekeeper Flaw to Attack MacOS Computers

Hackers exploited a zero-day security flaw within Gatekeeper tool to attack MacOS computers. — Read on thehackernews.com/2021/04/hackers-exploit-0-day-gatekeeper-flaw.html

Posted byDon HackmanApril 27, 2021Posted inInfoSecTags:securityLeave a comment on PSA:Hackers Exploit 0-Day Gatekeeper Flaw to Attack MacOS Computers

All Your Macs Are Belong To Us : Objective-See

All Your Macs Are Belong To Us – bypassing macOS’s file quarantine, gatekeeper, and notarization requirements — Read on objective-see.com/blog/blog_0x64.html

Posted byDon HackmanApril 26, 2021Posted inGeneralTags:securityLeave a comment on All Your Macs Are Belong To Us : Objective-See

Blockchain and Trust – Schneier on Security

Blockchain and Trust – Schneier on Security — Read on http://www.schneier.com/blog/archives/2019/02/blockchain_and_.html

Posted byDon HackmanApril 25, 2021Posted inInfoSecTags:securityLeave a comment on Blockchain and Trust – Schneier on Security

Threat matrix for Kubernetes

While Kubernetes has many advantages, it also brings new security challenges. — Read on http://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/

Posted byDon HackmanApril 25, 2021Posted inGeneralTags:securityLeave a comment on Threat matrix for Kubernetes

Machine Learning to Detect Software Vulnerabilities

https://www.schneier.com/blog/archives/2019/01/machine_learnin.html

Posted byDon HackmanJanuary 12, 2019Posted inApplication Development, InfoSec, MLTags:securityLeave a comment on Machine Learning to Detect Software Vulnerabilities

The new landscape of pre-installed mobile malware

The new landscape of pre-installed mobile malware: malicious code within https://blog.malwarebytes.com/cybercrime/2019/01/the-new-landscape-of-preinstalled-mobile-malware-malicious-code-within/

Posted byDon HackmanJanuary 7, 2019Posted inInfoSecTags:securityLeave a comment on The new landscape of pre-installed mobile malware

Better patch windows server ASAP

Better patch Windows Server ASAP as remotely exploitable vulnerability found https://mspoweruser.com/better-patch-windows-server-asap-are-remotely-exploitable-vulnerability-found/

Posted byDon HackmanJanuary 6, 2019Posted inInfoSecTags:securityLeave a comment on Better patch windows server ASAP

Click2Gov Breaches Show The Power Of Zero Days

https://www.forbes.com/sites/taylorarmerding/2018/12/21/click2gov-breaches-show-the-power-of-zero-days/#751334877e2e  

Posted byDon HackmanJanuary 2, 2019Posted inInfoSecTags:securityLeave a comment on Click2Gov Breaches Show The Power Of Zero Days

Researcher Drops Third Windows Zero-Day Exploit in Four Months

Researcher Drops Third Windows Zero-Day Exploit in Four Months https://securityboulevard.com/2018/12/researcher-drops-third-windows-zero-day-exploit-in-four-months/

Posted byDon HackmanDecember 30, 2018Posted inInfoSecTags:securityLeave a comment on Researcher Drops Third Windows Zero-Day Exploit in Four Months

Posts navigation

1 2 Older posts
Don Hackman, Blog at WordPress.com.
  • Follow Following
    • Don Hackman
    • Already have a WordPress.com account? Log in now.
    • Don Hackman
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy