
Sue Poremba
Writer at Freelance
Writer specializing in cybersecurity and content marketing. Always looking for new writing opportunities.
Articles
-
1 month ago |
securityboulevard.com | Richi Jennings |Sue Poremba
Microsoft Won’t Fix This Bad Zero Day (Despite Wide Abuse) | | .lnk, APT37, APT43, BitterAPT, china espionage, CWE-451, Cybersecurity zero-day flaw, Earth Anansi, Earth Imp, Earth Kumiho, Earth Manticore, Evil Corp., InkySquid, Iranian hackers, kimsuky, Kimsuky hacking group, Konni, LNK file malware, LNKFiles, malicious LNK files, Microsoft, Microsoft Windows Zero Day, North Korean cyber espionage, russia hacker, SB Blogwatch, ScarCruft, Windows, ZDI-CAN-25373, Zero Day Attacks, zero day...
-
1 month ago |
securityboulevard.com | David J. Lindner |Sue Poremba |Nathan Eddy
-
2 months ago |
ibm.com | Sue Poremba
In an interview with Ruben Boonen, CNE Capability Development Lead at IBM, we dig into what researchers think of Apple's Private Cloud Compute system.
-
2 months ago |
securityintelligence.com | Sue Poremba
In an interview with Ruben Boonen, CNE Capability Development Lead at IBM, we dig into what researchers think of Apple's Private Cloud Compute system.
-
2 months ago |
securityintelligence.com | Sue Poremba
Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. Expect to see more software supply chain attacks moving forward.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 1K
- DMs Open
- Yes
Sharing on behalf of a colleague. https://t.co/uX5t32oiNM
For an article I'm working on: Looking for people w/ diverse backgrounds, recently hired to work in AI (AI and security is a bonus but not necessary). If you know of someone (or you fit the bill), send me a DM and I can give you all the details.
Do you have a new cybersecurity book or know of one that you think I should profile? Let me know and I may feature you in the future! In this piece, I talk to Scott Shapiro, author of Fancy Bear Goes Phishing. https://t.co/RsLcczMx0g