In two days, ethical researchers from 10 countries have unearthed more than 22 zero-day bugs in a wide range of technologies at the annual hacking contest.
Read moreGitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.
Read moreA new threat actor is racking up victims and showing unusual agility. Part of its success could spring from the use of the Nim programming language.
Read moreMalicious ChatGPT Extensions Add to Google Chrome Woes
March 25 2023The second malicious ChatGPT extension for Chrome has been discovered, giving malicious actors access to users' Facebook accounts through stolen cookies.
Read moreMalicious ChatGPT Extensions Add to Google Chrome Woes
March 25 2023The second malicious ChatGPT extension for Chrome has been discovered, giving malicious actors access to users' Facebook accounts through stolen cookies.
Read moreRed Teaming at Scale to Uncover Your Big Unknowns
March 25 2023A contrarian mindset with applied imagination allows security professionals to assess problems in their organization, prevent failure, or mitigate vulnerabilities.
Read moreIf you haven't done so already, it's time to take the first step toward solving this application security dilemma.
Read moreOpen source software continues to pose a challenge for companies. With the proper security practices, you can reduce your open source risk and manage it.
Read more"Nexus" is the latest in a vast and growing array of Trojans targeting mobile banking and cryptocurrency applications.
Read more
Recent Comments