The exploit requires a specific nonstandard configuration to work, limiting the danger it poses, but future research could turn up more broadly usable attacks.
Read moreRansomware: Should Companies Ever Pay Up?
March 31 2022Ransomware is a major threat, and no business is "too small to target." So what should you do after an attack? Is negotiating with criminals ever the answer?
Read moreThe cybersecurity market is red-hot. But with so many still-unfilled positions, companies may be more willing to bend or break some hiring rules.
Read moreGlobal BEC Crackdown Nets 65 Suspects
March 31 2022FBI and international law enforcement agencies execute "Operation Eagle Sweep."
Read moreThe Academic Engagement Network is designed to advance cybersecurity in four areas.
Read moreTake a preventative threat approach and apply security measures near end users, applications, and data to increase protection.
Read moreNation-State Hackers Ramp Up Ukraine War-Themed Attacks
March 31 2022Among them is the operator of the Ghostwriter misinformation campaign, with a new browser-in-browser phishing technique, according to Google's research team.
Read moreA proof-of-concept exploit allows remote compromises of Spring Web applications.
Read moreA proof-of-concept exploit allows remote compromises of Spring Web applications.
Read more
Recent Comments