Researchers discover a lack of explicit memory protections around the shared memory used by the Db2 trace facility.
Read moreMFA Mistakes: 6 Ways to Screw Up Multifactor Authentication
August 20 2020Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.
Read moreBlack Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives.
Read moreBlack Hat USA 2020 Recap: Experts Discuss Election Security Questions, but Offer Few Answers
August 20 2020The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities...
Read moreBanks and the New Abnormal
August 20 2020Banks have hesitated to adopt many strong security practices, and for understandable reasons. But now is the time to be bold.
Read more10 Resume and Interview Tips from Security Pros
August 19 2020Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.
Read moreFuzzing Services Help Push Technology into DevOps Pipeline
August 19 2020As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.
Read moreSophisticated P2P Botnet Targeting SSH Servers
August 19 2020'FritzFrog' is fileless, uses its own proprietary P2P implementation, and has breached at least 500 servers so far, Guardicore says.
Read moreSophisticated P2P Botnet Targeting SSH Servers
August 19 2020'FritzFrog' is fileless, uses its own proprietary P2P implementation, and has breached at least 500 servers so far, Guardicore says.
Read more
Recent Comments