SBOMs aren't enough: Developers need to dig deeper into how software is built by using a process called binary source validation.
Read moreSweet Security Debuts Runtime Management for Cloud
August 10 2023Existing detection tools either provide limited functionality or aren't optimized for the cloud, Israeli startup claims.
Read moreOperation Jackal involved law enforcement agencies in 21 countries and yielded more than 100 arrests.
Read moreThe APT has been rampaging across three continents on behalf of China's Ministry of State Security, and now claims the throne as kings of intelligence gathering and economic espionage.
Read moreAI Risk Database Tackles AI Supply Chain Risks
August 9 2023The open source tool — a collaboration between Robust Intelligence, MITRE, and Indiana University — assesses heavily shared, public machine learning models for risk.
Read moreNearly a decade after it was disclosed, the Shellshock vulnerability still plagues organizations. Learn how to protect yourself.
Read moreProtecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
Read moreDark Reading News Desk returns for a second day of interviews from Black Hat USA 2023. The livestream will start at 10 a.m. PT.
Read moreUsing Machine Learning to Detect Keystrokes
August 9 2023Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy.
“A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards”
Abstract: With recent developments in deep...
Read more
Microsoft Patch Tuesday, August 2023 Edition
August 9 2023Microsoft Corp. today issued software updates to plug more than 70 security holes in its Windows operating systems and related products, including a patch that addresses multiple zero-day vulnerabilities...
Read more
Recent Comments