Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
Read more"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
Read moreMandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Read moreAttacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
Read moreResearchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
Read moreSecurity leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
Read moreWhy Supply Chain Attacks Are Destined to Escalate
August 5 2021In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part...
Read moreNew Normal Demands New Security Leadership Structure
August 2 2021At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
Read more"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
Read more
Recent Comments