Latest episode - listen now!
Read moreFragAttacks Foil 2 Decades of Wireless Security
August 6 2021Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
Read moreFriday Squid Blogging: Squid Dog Toy
August 6 2021It’s sold out, but the pictures are cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...
Read moreNew research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
Read moreConti ransomware affiliate goes rogue, leaks “gang data”
August 6 2021Once more unto the breach, dear friends, once more...
Read more
Fascinating research: “Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.”
Abstract: A master face is a face image that passes face-based identity-authentication for a large...
Read more
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
Read more"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
Read moreMandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Read moreAhhhh, the irony! Red-team network attack tool has its very own bug for Blue Teams to counterexploit.
Read more
Recent Comments