Details of an NSA Hacking Operation
March 3 2022Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to...
Read morePangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to...
Read moreAs BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.
Read moreThe Linux Foundation and Harvard University create lists of the top 500 most popular open source projects, highlighting critical software that needs to be secured.
Read moreKey findings show API attack traffic grew at more than twice the rate of non-malicious traffic, and API security concerns are inhibiting innovation for two-thirds of organizations.
Read moreThe push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
Read moreA vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.
Read moreSoftware code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations' security at risk.
Read moreFPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be potentially serious.
Read moreWhy this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.
Read moreEarlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation...
Read more
Recent Comments