TA410: The 3-headed cyberespionage threat actor

Image: Sergey Nivens/Shutterstock New discoveries have been published by ESET about a cyberespionage threat actor dubbed TA410, active since at least 2018 and who targeted U.S. companies in the utilities…

Wi-Fi May Be Coming Soon to a Lamppost Near You

NIST communications researchers traveled to downtown Boulder, Colorado, to verify their channel model for evaluating high-frequency wireless network designs. Sung Yun Jun is checking the alignment of the transmitter, mounted…

Adding Custom GitHub Badges to Your Repo

If you’ve spent time looking at open-source repos on GitHub, you’ve probably noticed that most of them use badges in their README files. Take the official React repository, for instance. There are GitHub badges all over the README file that communicate important dynamic info, like the latest released … Adding Custom GitHub Badges…

CyberArk vs BeyondTrust: Compare IAM solutions

It’s time to upgrade your IAM software, but which security tool should you choose? See how the features of CyberArk and BeyondTrust compare. Image: jijomathai/Adobe Stock Must-read security coverage Choosing…