A vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.
Read moreCompanies’ Code Leaking More Passwords and Secrets
March 2 2022Software code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations' security at risk.
Read moreFPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be potentially serious.
Read more3 Ways to Expand Gender Diversity in Cybersecurity
March 2 2022Why this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.
Read moreConti Ransomware Group Diaries, Part II: The Office
March 2 2022Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation...
Read more"Change your code to improve cryptomining"... or we'll dump 1TB of stolen secrets.
Read moreOrdr Clinical Defender, running on the new Ordr 8 Software release, provides focused, actionable, and accurate HTM insights and workflows.
Read moreOrdr Clinical Defender, running on the new Ordr 8 Software release, provides focused, actionable, and accurate HTM insights and workflows.
Read moreDive into the case for RASP to combat Log4Shell and why Web app firewalls aren't great for these types of attacks.
Read moreReduce Risk With Better Cyber Due Diligence
March 2 2022Done incorrectly, due diligence can result in slower integration of assets, which increases acquisition costs associated and could reduce expected gains.
Read more
Recent Comments