A bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users' personal or business Google Drives, Photos, Gmail,...
Read moreThe Open Source Security Foundation's SLSA v1.0 release is an important milestone in improving software supply chain security and providing organizations with the tools they need to protect their...
Read moreThe new Security Legal Research Fund and the Hacking Policy Council are aimed at protecting "good faith" security researchers from legal threats and giving them a voice in policy...
Read moreRed Canary Announces Readiness
April 21 2023Mandiant found that North Korea's UNC4736 gained initial access on 3CX's network when an employee downloaded a weaponized but legitimately-signed app from Trading Technologies.
Read moreMajor US CFPB Data Breach Caused by Employee
April 21 2023The sensitivity of the personal information involved in the breach has yet to be determined by agency officials, but it affects 256,000 consumers.
Read moreVulnerable MS-SQL database servers have external connections and weak account credentials, researchers warn.
Read moreS3 Ep131: Can you really have fun with FORTRAN?
April 21 2023Loop-the-loop in this week's episode. Entertaining, educational and all in plain English. Transcript inside.
Read moreTwitter’s 2FA Policy Is a Call for Passkey Disruption
April 21 2023Overcoming the limitations of consumer MFA with a new flavor of passwordless.
Read more
Recent Comments