"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
Read moreMandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Read moreAhhhh, the irony! Red-team network attack tool has its very own bug for Blue Teams to counterexploit.
Read moreAttacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
Read moreResearchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
Read moreSecurity leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
Read moreWhy Supply Chain Attacks Are Destined to Escalate
August 5 2021In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part...
Read moreRansomware Gangs and the Name Game Distraction
August 5 2021It's nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband. We hang on to these occasional victories because history tells...
Read moreZoom Lied about End-to-End Encryption
August 5 2021
The facts aren’t news, but Zoom will pay $85M — to the class-action attorneys, and to users — for lying to users about end-to-end encryption, and for giving...
Read moreCalling someone back feels safer than clicking an unknown link... but it isn't! Remind your friends and family.
Read more
Recent Comments