S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and crypto-dodginess [Podcast]
April 21 2022Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!
Read moreDo you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!
Read moreDo you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!
Read moreA large number of enterprise applications are affected by the vulnerability in log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that...
Read moreRonan Farrow has a long article in the New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on...
Read moreIntel, FiVerity, and Fortanix team up to launch an AI-driven fraud detection platform into a confidential computing environment.
Read moreNew research shows threat actors increasingly leveraging social networks for attacks, with LinkedIn being used in 52% of global phishing attacks.
Read moreCompanies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.
Read moreCloud security is constantly evolving and consistently different than defending on-premises assets. Denonia, a recently discovered serverless cryptominer drives home the point.
Read moreThe Russian government is ratcheting up malicious cyberattacks against critical infrastructure in countries supporting Ukraine.
Read moreStuxnet was the first known malware built to attack operational technology environment. Since then, there have been several others.
Read more
Recent Comments