Analyzing the Swiss E-Voting System
July 1 2022Andrew Appel has a long analysis of the Swiss online voting system. It’s a really good analysis of both the system and the official analyses.
Read moreAndrew Appel has a long analysis of the Swiss online voting system. It’s a really good analysis of both the system and the official analyses.
Read moreTransitive dependencies can complicate the process of developing software bills of materials.
Read moreTransitive dependencies can complicate the process of developing software bills of materials.
Read moreThe RSA conference in San Francisco always feels like drinking from a fire hose but especially this year at the first in-person RSA since the pandemic began.
Read moreWith more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
Read moreCyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of...
Read moreWired is reporting on a new remote-access Trojan that is able to infect at least eighty different targets:
So far, researchers from Lumen Technologies’ Black Lotus Labs say they’ve...
Read more
It didn't have to be this way: So far 2022's tranche of zero-days shows too many variants of previously patched security bugs, according Google Project Zero.
Read moreA recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
Read moreMalicious ISS module exploitation is the latest trend among threat actors targeting Exchange servers, analysts say.
Read more
Recent Comments