Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Read moreHertzbleed: A New Side-Channel Attack
June 20 2022Hertzbleed is a new side-channel attack that works against a variety of microprocressors. Deducing cryptographic keys by analyzing power consumption has long been an attack, but it’s not generally...
Read moreFrom a restaurant in Singapore. It’s not actually giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreRansomware and Phishing Remain IT’s Biggest Concerns
June 17 2022Security teams — who are already fighting off malware challenges — are also facing renewed attacks on cloud assets and remote systems.
Read moreThe code injection vulnerability is being actively exploited in the wild, researchers say.
Read moreThe QNAP network-connected devices, used to store video surveillance footage, are a juicy target for attackers, experts warn.
Read moreMost of the attacks involve the use of automated exploits, security vendor says.
Read moreThe energy sector remains susceptible to both espionage between nation-states and cybercrime, and recent developments keep pointing toward more attacks.
Read moreThe stakes are high when protecting CNI from destructive malware and other threats.
Read moreTracking People via Bluetooth on Their Phones
June 17 2022We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research...
Read more
Recent Comments