Man Arrested for AWS Bomb Plot

A man caught in an FBI sting allegedly said he wanted to destroy “70 percent of the internet” by going after the tech giant’s data centers. A Texas man has been charged with plotting a bombing of Amazon Web Services in a quest to allegedly “kill off the internet.” Seth Aaron Pendley was arrested in … Continue reading Man Arrested for AWS Bomb Plot

Cybersecurity firm Darktrace plans £3bn IPO on London Stock Exchange

The British cybersecurity firm Darktrace has announced plans for a £3bn listing on the London Stock Exchange, providing a shot in the arm for the City after Deliveroo’s disastrous debut damaged the capital’s reputation for big tech “unicorn” flotations. Poppy Gustafsson, the company’s 38-year-old chief executive who holds a stake that will be worth a … Continue reading Cybersecurity firm Darktrace plans £3bn IPO on London Stock Exchange

1.3M Clubhouse Users’ Data Dumped in Hacker Forum for Free

Clubhouse denies it was ‘breached’ and says the data is out there for anyone to grab. Clubhouse, the startup invitation-only chat app, is the latest social-media platform to see mammoth troves of user data collected and posted in underground forums. An SQL file containing the personal data of 1.3 million Clubhouse users has been posted … Continue reading 1.3M Clubhouse Users’ Data Dumped in Hacker Forum for Free

How to raise the cybersecurity poverty line and make companies more secure

The cybersecurity poverty line is a term that can help companies understand security gaps and build better awareness. Learn more about it and how it applies to your organization. As a system administrator, cybersecurity has been especially prominent on my mind for the past year as my organization has exclusively engaged in remote work. I'm … Continue reading How to raise the cybersecurity poverty line and make companies more secure

What Does It Take To Be a Cybersecurity Researcher?

Behind the strategies and solutions needed to counter today's cyber threats are—dedicated cybersecurity researchers. They spend their lives dissecting code and analyzing incident reports to discover how to stop the bad guys. But what drives these specialists? To understand the motivations for why these cybersecurity pros do what they do, we decided to talk with … Continue reading What Does It Take To Be a Cybersecurity Researcher?