Here, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)
Read moreThere's still a great deal of capital available for innovative companies helping businesses secure their IT environments.
Read morePowered by GPT-4, innovative new AI-driven capabilities lower application security (AppSec) risk and help security teams "shift everywhere" with speed and accuracy.
Read moreThe European Commission voted a new electronic identification scheme that creates new opportunities for EU citizens and businesses.
Read moreResearchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
Read moreChinese Hacking of US Critical Infrastructure
May 31 2023Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details about how the group, called Volt Typhoon, accesses target networks...
Read moreBy finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
Read moreSome companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce won't move on from them.
Read moreAs the second Kaminsky Fellow, Dr. Andrews will study the use of threat intelligence to track campaigns against the human rights community.
Read moreDiscord Admins Hacked by Malicious Bookmarks
May 31 2023A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser...
Read more
Recent Comments