Attackers increasingly use third-party service providers to bypass organizations’ security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create. US Customs and...
Read moreAttackers increasingly use third-party service providers to bypass organizations’ security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create. US Customs and...
Read moreIn vulnerability disclosure programs, organizations are paying more in total for XSS issues than any other vulnerability type, HackerOne says. Cross-site scripting (XSS) errors that allow attackers to inject...
Read moreIn vulnerability disclosure programs, organizations are paying more in total for XSS issues than any other vulnerability type, HackerOne says. Cross-site scripting (XSS) errors that allow attackers to inject...
Read moreImagine Game of Thrones’ Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security. Season 8 of the award-winning and critically...
Read moreImagine Game of Thrones’ Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security. Season 8 of the award-winning and critically...
Read moreCognitive Bias Can Hamper Security Decisions
June 11 2019A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes. It’s a scenario commonly seen in today’s businesses: executives read headlines of major...
Read moreCognitive Bias Can Hamper Security Decisions
June 11 2019A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes. It’s a scenario commonly seen in today’s businesses: executives read headlines of major...
Read moreHunting COM Objects (Part Two)
June 11 2019Background As a follow up to Part One in this blog series on COM object hunting, this post will talk about taking the COM object...
Read moreHuawei Represents Massive Supply Chain Risk: Report
June 11 2019The Chinese technology giant’s enormous product and service footprint gives it access to more data than almost any other single organization, Recorded Future says. A new report from threat...
Read more
Recent Comments