"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
Read more"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
Read moreGnuTLS patches memory mismanagement bug – update now!
August 1 2022GnuTLS may well be the most widespread cryptographic toolkit you've never heard of. Learn more...
Read moreGnuTLS patches memory mismanagement bug – update now!
August 1 2022GnuTLS may well be the most widespread cryptographic toolkit you've never heard of. Learn more...
Read moreName That Edge Toon: Up a Tree
August 1 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreTech companies play a vital role in global communication, which has profound effects on how politics, policies, and human rights issues play out.
Read moreShort article on the evolution of the vampire squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t...
Read moreIdentity and access management was front and center at AWS re:inforce this week.
Read moreAttackers Have ‘Favorite’ Vulnerabilities to Exploit
July 29 2022While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.
Read more
Recent Comments