The vulnerability gap continues to persist, and IT and security teams can play a major role in reducing their attack surface.
Read moreKernel mode driver can download second-stage payload directly to memory, allowing threat actors to evade endpoint detection and response tools.
Read moreKernel mode driver can download second-stage payload directly to memory, allowing threat actors to evade endpoint detection and response tools.
Read moreStartup Spotlight: Mobb Aims to Be the Fixer
July 13 2023The startup, one of four finalists in this year's Black Hat USA Startup Spotlight competition, automates vulnerability remediation using AI.
Read moreForeign state-sponsored actors likely had access to privileged state emails for weeks, thanks to a token validation vulnerability.
Read moreFiredome Integrates With Microsoft Defender for IoT to Enhance IoT Device Security, Using Microsoft Sentinel
July 13 2023Firedome's on device real-time detection, prevention and response along with Microsoft Defender for IoT cloud-based security provides a holistic view of IoT attacks for the first time.
Read morePartnership program empowers underrepresented groups by removing barriers to entering the cybersecurity workforce.
Read more
Recent Comments