
David Balaban
Cybersecurity Expert, Journalist, Editor at Freelance
David Balaban is a computer security researcher with over 17 years of experience in malware analysis and antivirus software evaluation.
Articles
-
3 days ago |
benzinga.com | David Balaban
Here's a harsh but essential truth for anybody entering into the blockchain space. It doesn't matter how revolutionary or cutting-edge your startup is, if nobody in the crypto world catches wind of it, your token launch will fall flat. The blockchain ecosystem moves quickly, with thousands of new projects launching every day. And early adopters (the risk-taking investors who can make or break your initial momentum) have countless options competing for their attention and capital.
-
5 days ago |
secureworld.io | David Balaban
From Menu to Malware: How Innocent Scans Lead to Quishing Attacks6:14 You're at a café, waiting for your coffee. Instead of a physical menu, there's a QR code on the table. You scan it without hesitation because it feels like second nature now. At the gym, the flyer advertising a free class also has a QR code. At a music festival, a food truck uses one to take orders. In the moment, scanning seems efficient, even enjoyable.
-
5 days ago |
benzinga.com | David Balaban
With social media oversharing, ubiquitous data brokers, and polarizing public discourse being the new norm, the online privacy of high-ranking executives isn't just a personal matter anymore. It's a corporate concern. CEOs, CFOs, and other public-facing business leaders are increasingly in the crosshairs of executive doxxing, the act of publishing personally identifiable information online with malicious intent.
-
1 month ago |
benzinga.com | David Balaban
If you've been in the cybersecurity space long enough, you'll know that having great tech isn't enough on its own. You as a vendor need decision makers to actually know about it, which translates into leveraging an effective strategy to distribute your security announcement so that it’s heard by the intended audience. But there's a brutal yet simple reality that security vendors need to keep in mind. Most security announcements fail to reach the people who control budgets.
-
1 month ago |
cloudsecurityalliance.org | David Balaban
Written by David Balaban. At this point, it’s hardly news that the vast majority of cybersecurity breaches start with social engineering campaigns, most commonly phishing attacks. It’s not just breaches, either: according to some estimates, a whopping 45% of ransomware attacks begin with phishing campaigns, for example. Disrupting such cyberattacks early, at the social engineering stage, is an effective way to protect your organization from the oft-costly and damaging consequences of a breach.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 11
- Tweets
- 44
- DMs Open
- No

Ways to Pinpoint Exploitable IoT Devices https://t.co/Vdc5Qj2SZH

How Good Are In-Browser Password Managers? https://t.co/Om4W0eMHdG

Ransomware evolution chronicles https://t.co/6YGfbaBMO9