The Pipeline Attack – Is Log Analysis Enough for Cybersecurity? Threat Hunting Frameworks and Methodologies: An Introductory Guide Lawmakers balk at cost-overruns, transparency issues with VA’s $21 billion health record program Unpatched iPhone Bug Allows Remote Device Takeover How to…