Jaspen IT Services
  • Home
  • Our Services
  • News
  • Equipment
  • Online Payment
  • Login
  • Support
  • tel: 760-872.2797
Select Page

Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud

May 12, 2021 | Cloud Security, InfoSec Insider, IoT, Malware, News, Web Security

Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud Aamir Lakhani, researcher at FortiGuard Labs, discusses leading-edge threats related to edge access/browsers/IoT, and the COVID-19 vaccine, as a way of getting into larger organizations. Go to Source...

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

May 2, 2021 | Government, Hacks, InfoSec Insider, Malware, News

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange Oliver Tavakoli, CTO of Vectra AI, discusses the differences between the massive supply-chain hack and the Exchange zero-day attacks, and their legacy and ramifications for security professionals. Go to Source...

4 Innovative Ways Cyberattackers Hunt for Security Bugs

Apr 22, 2021 | Hacks, InfoSec Insider, News, Vulnerabilities, Web Security

David “moose” Wolpoff, co-founder and CTO at Randori, talks lesser-known hacking paths, including unresolved “fixme” flags in developer support groups.

Crossing the Line: When Cyberattacks Become Acts of War

Apr 7, 2021 | Government, Hacks, InfoSec Insider, Malware, News, Web Security

The Cold War concept isn’t outdated. In the decades since the fall of the Soviet Union, the battleground has simply shifted from conflicts between ideological proxy governments to cyberspace. And the opponents have grown from a few primary nations into a broad range...

How To Defend the Extended Network Against Web Risks

Apr 5, 2021 | Hacks, InfoSec Insider, News, Vulnerabilities, Web Security

Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it.

From PowerShell to Payload: An Analysis of Weaponized Malware

Apr 2, 2021 | InfoSec Insider, Malware, News

John Hammond, security researcher with Huntress, takes a deep-dive into a malware’s technical and coding aspects.
« Older Entries

Recent Posts

  • Nvidia could beat AMD in battle of next-gen GPUs going by latest leak
  • The Intel Arc Alchemist range might disappoint PC gamers
  • Nvidia RTX 4080 could be here sooner than we thought – beating AMD to the punch
  • AMD claims Big Navi offers more bang for the buck compared to Nvidia’s RTX cards
  • The new Asus RTX 3080 Noctua Edition might the quietest high-end card yet

Recent Comments

    The Jaspen Corporation © 1999 - 2021 | Web Design | Hosting |IT Solutions | Film Production Services | Webmail Access