EvilExtractor Infostealer Campaign Targeting Windows OS
April 22 2023Uptick in EvilExtractor activity aims to compromise endpoints to steal browser from targets across Europe and the US, researchers say.
Read moreUptick in EvilExtractor activity aims to compromise endpoints to steal browser from targets across Europe and the US, researchers say.
Read moreWhile Intel is building more hardware protections directly into the chips, enterprises still need a strategy for applying security updates on these components.
Read moreSoftware written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.
Read moreAttackers have their methods timed to the second, and they know they have to get in, do their damage, and get out quickly. CISOs today must detect and block...
Read moreA bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users' personal or business Google Drives, Photos, Gmail,...
Read moreThe new Security Legal Research Fund and the Hacking Policy Council are aimed at protecting "good faith" security researchers from legal threats and giving them a voice in policy...
Read moreThe Open Source Security Foundation's SLSA v1.0 release is an important milestone in improving software supply chain security and providing organizations with the tools they need to protect their...
Read more
Recent Comments